Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. parse-server
  4. ›
  5. CVE-2026-33539

CVE-2026-33539: Parse Server has SQL Injection through aggregate and distinct field names in PostgreSQL adapter

March 24, 2026

An attacker with master key access can execute arbitrary SQL statements on the PostgreSQL database by injecting SQL metacharacters into field name parameters of the aggregate $group pipeline stage or the distinct operation. This allows privilege escalation from Parse Server application-level administrator to PostgreSQL database-level access.

Only Parse Server deployments using PostgreSQL are affected. MongoDB deployments are not affected.

References

  • github.com/advisories/GHSA-p2w6-rmh7-w8q3
  • github.com/parse-community/parse-server
  • github.com/parse-community/parse-server/pull/10272
  • github.com/parse-community/parse-server/pull/10273
  • github.com/parse-community/parse-server/security/advisories/GHSA-p2w6-rmh7-w8q3
  • nvd.nist.gov/vuln/detail/CVE-2026-33539

Code Behaviors & Features

Detect and mitigate CVE-2026-33539 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.6.59, all versions starting from 9.0.0 before 9.6.0-alpha.53

Fixed versions

  • 9.6.0-alpha.53
  • 8.6.59

Solution

Upgrade to versions 8.6.59, 9.6.0-alpha.53 or above.

Impact 7.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

npm/parse-server/CVE-2026-33539.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 12:18:34 +0000.