CVE-2026-31872
HIGH
8,7
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.6 and 8.6.32, the protectedFields class-level permission (CLP) can be bypassed using dot-notation in query WHERE clauses and sort parameters. An attacker can use dot-notation to query or sort by sub-fields of a protected field, enabling a binary oracle attack to enumerate protected field values. This affects both MongoDB and PostgreSQL deployments. This vulnerability is fixed in 9.6.0-alpha.6 and 8.6.32.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0004
Percentile
0,1th
Updated
EPSS Score Trend (Last 5 Days)
284
Improper Access Control
IncompleteCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
Technologies:
ICS/OT, Not Technology-Specific, Web Based
Application
Parse-Server by Parseplatform
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Parse-Server by Parseplatform
Version Range Affected
From
9.0.0
(inclusive)
To
9.6.0
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Parse-Server by Parseplatform
Version Range Affected
To
8.6.32
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Parse-Server by Parseplatform
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Parse-Server by Parseplatform
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Parse-Server by Parseplatform
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Parse-Server by Parseplatform
CPE Identifier
View Detailed Analysis
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha2:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/parse-community/parse-server/releases/tag/8.6.32
https://github.com/parse-community/parse-server/releases/tag/9.6.0-alpha.6
https://github.com/parse-community/parse-server/security/advisories/GHSA-r2m8-p…