CVE-2026-30962

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.6 and 8.6.19, the validation for protected fields only checks top-level query keys. By wrapping a query constraint on a protected field inside a logical operator, the check is bypassed entirely. This allows any authenticated user to query on protected fields to extract field values. All Parse Server deployments have default protected fields and are vulnerable. This vulnerability is fixed in 9.5.2-alpha.6 and 8.6.19.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha5:*:*:*:node.js:*:*

History

11 Mar 2026, 16:59

Type Values Removed Values Added
CPE cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha4:*:*:*:node.js:*:*
First Time Parseplatform
Parseplatform parse-server
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://github.com/parse-community/parse-server/releases/tag/8.6.19 - () https://github.com/parse-community/parse-server/releases/tag/8.6.19 - Product, Release Notes
References () https://github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.6 - () https://github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.6 - Product, Release Notes
References () https://github.com/parse-community/parse-server/security/advisories/GHSA-72hp-qff8-4pvv - () https://github.com/parse-community/parse-server/security/advisories/GHSA-72hp-qff8-4pvv - Mitigation, Patch, Vendor Advisory

11 Mar 2026, 13:52

Type Values Removed Values Added
Summary
  • (es) Parse Server es un backend de código abierto que puede ser desplegado en cualquier infraestructura que pueda ejecutar Node.js. Antes de 9.5.2-alpha.6 y 8.6.19, la validación para campos protegidos solo verifica claves de consulta de nivel superior. Al envolver una restricción de consulta en un campo protegido dentro de un operador lógico, la verificación se omite por completo. Esto permite a cualquier usuario autenticado consultar campos protegidos para extraer valores de campo. Todas las implementaciones de Parse Server tienen campos protegidos predeterminados y son vulnerables. Esta vulnerabilidad está corregida en 9.5.2-alpha.6 y 8.6.19.

10 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 21:16

Updated : 2026-03-11 16:59


NVD link : CVE-2026-30962

Mitre link : CVE-2026-30962

CVE.ORG link : CVE-2026-30962


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
CWE-284

Improper Access Control