Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. parse-server
  4. ›
  5. CVE-2026-30962

CVE-2026-30962: Parse Server has a protected fields bypass via logical query operators

March 11, 2026

The validation for protected fields only checks top-level query keys. By wrapping a query constraint on a protected field inside a logical operator, the check is bypassed entirely. This allows any authenticated user to query on protected fields to extract field values.

All Parse Server deployments have default protected fields and are vulnerable.

References

  • github.com/advisories/GHSA-72hp-qff8-4pvv
  • github.com/parse-community/parse-server
  • github.com/parse-community/parse-server/releases/tag/8.6.19
  • github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.6
  • github.com/parse-community/parse-server/security/advisories/GHSA-72hp-qff8-4pvv
  • nvd.nist.gov/vuln/detail/CVE-2026-30962

Code Behaviors & Features

Detect and mitigate CVE-2026-30962 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.6.19, all versions starting from 9.0.0 before 9.5.2-alpha.6

Fixed versions

  • 9.5.2-alpha.6
  • 8.6.19

Solution

Upgrade to versions 8.6.19, 9.5.2-alpha.6 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

npm/parse-server/CVE-2026-30962.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 18 Mar 2026 12:20:03 +0000.