Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. parse-server
  4. ›
  5. CVE-2026-30966

CVE-2026-30966: Parse Server has role escalation and CLP bypass via direct `_Join` table write

March 11, 2026

Parse Server’s internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required.

An attacker can create, read, update, or delete records in any internal relationship table. Exploiting this allows the attacker to inject themselves into any Parse Role, gaining all permissions associated with that role, including full read, write, and delete access to classes protected by role-based Class-Level Permissions (CLP). Similarly, writing to any such table that backs a Relation field used in a pointerFields CLP bypasses that access control.

References

  • github.com/advisories/GHSA-5f92-jrq3-28rc
  • github.com/parse-community/parse-server
  • github.com/parse-community/parse-server/releases/tag/8.6.20
  • github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.7
  • github.com/parse-community/parse-server/security/advisories/GHSA-5f92-jrq3-28rc
  • nvd.nist.gov/vuln/detail/CVE-2026-30966

Code Behaviors & Features

Detect and mitigate CVE-2026-30966 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.6.20, all versions starting from 9.0.0-alpha.1 before 9.5.2-alpha.7

Fixed versions

  • 9.5.2-alpha.7
  • 8.6.20

Solution

Upgrade to versions 8.6.20, 9.5.2-alpha.7 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

npm/parse-server/CVE-2026-30966.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 19 Mar 2026 00:17:04 +0000.