CVE-2026-30962: Parse Server has a protected fields bypass via logical query operators
The validation for protected fields only checks top-level query keys. By wrapping a query constraint on a protected field inside a logical operator, the check is bypassed entirely. This allows any authenticated user to query on protected fields to extract field values.
All Parse Server deployments have default protected fields and are vulnerable.
References
- github.com/advisories/GHSA-72hp-qff8-4pvv
- github.com/parse-community/parse-server
- github.com/parse-community/parse-server/releases/tag/8.6.19
- github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.6
- github.com/parse-community/parse-server/security/advisories/GHSA-72hp-qff8-4pvv
- nvd.nist.gov/vuln/detail/CVE-2026-30962
Code Behaviors & Features
Detect and mitigate CVE-2026-30962 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →