CVE-2026-34363

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.65 and 9.7.0-alpha.9, when multiple clients subscribe to the same class via LiveQuery, the event handlers process each subscriber concurrently using shared mutable objects. The sensitive data filter modifies these shared objects in-place, so when one subscriber's filter removes a protected field, subsequent subscribers may receive the already-filtered object. This can cause protected fields and authentication data to leak to clients that should not see them, or cause clients that should see the data to receive an incomplete object. Additionally, when an afterEvent Cloud Code trigger is registered, one subscriber's trigger modifications can leak to other subscribers through the same shared mutable state. Any Parse Server deployment using LiveQuery with protected fields or afterEvent triggers is affected when multiple clients subscribe to the same class. This issue has been patched in versions 8.6.65 and 9.7.0-alpha.9.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha8:*:*:*:node.js:*:*

History

02 Apr 2026, 18:11

Type Values Removed Values Added
References () https://github.com/parse-community/parse-server/commit/5834e29234593addaa0251a85f572ad4f376320b - () https://github.com/parse-community/parse-server/commit/5834e29234593addaa0251a85f572ad4f376320b - Patch
References () https://github.com/parse-community/parse-server/commit/776c71c3078e77d38c94937f463741793609d055 - () https://github.com/parse-community/parse-server/commit/776c71c3078e77d38c94937f463741793609d055 - Patch
References () https://github.com/parse-community/parse-server/pull/10330 - () https://github.com/parse-community/parse-server/pull/10330 - Issue Tracking, Patch
References () https://github.com/parse-community/parse-server/pull/10331 - () https://github.com/parse-community/parse-server/pull/10331 - Issue Tracking, Patch
References () https://github.com/parse-community/parse-server/security/advisories/GHSA-m983-v2ff-wq65 - () https://github.com/parse-community/parse-server/security/advisories/GHSA-m983-v2ff-wq65 - Patch, Vendor Advisory
CPE cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha8:*:*:*:node.js:*:*
First Time Parseplatform
Parseplatform parse-server
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

31 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 15:16

Updated : 2026-04-02 18:11


NVD link : CVE-2026-34363

Mitre link : CVE-2026-34363

CVE.ORG link : CVE-2026-34363


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')