CVE-2026-34595: Parse Server has a LiveQuery protected-field guard bypass via array-like logical operator value
An authenticated user with find class-level permission can bypass the protectedFields class-level permission setting on LiveQuery subscriptions. By sending a subscription with a $or, $and, or $nor operator value as a plain object with numeric keys and a length property (an “array-like” object) instead of an array, the protected-field guard is bypassed. The subscription event firing acts as a binary oracle, allowing the attacker to infer whether a protected field matches a given test value.
References
- github.com/advisories/GHSA-mmg8-87c5-jrc2
- github.com/parse-community/parse-server
- github.com/parse-community/parse-server/commit/f63fd1a3fe0a7c1c5fe809f01b0e04759e8c9b98
- github.com/parse-community/parse-server/commit/ffad0ec6b971ee0dd9545e1bf1fb34ddebf275c2
- github.com/parse-community/parse-server/pull/10350
- github.com/parse-community/parse-server/pull/10351
- github.com/parse-community/parse-server/security/advisories/GHSA-mmg8-87c5-jrc2
- nvd.nist.gov/vuln/detail/CVE-2026-34595
Code Behaviors & Features
Detect and mitigate CVE-2026-34595 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →