Moderate severityNVD Advisory· Published Mar 7, 2026· Updated Mar 9, 2026
Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization
CVE-2026-30850
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.9 and 9.5.0-alpha.9, the file metadata endpoint (GET /files/:appId/metadata/:filename) does not enforce beforeFind / afterFind file triggers. When these triggers are used as access-control gates, the metadata endpoint bypasses them entirely, allowing unauthorized access to file metadata. This issue has been patched in versions 8.6.9 and 9.5.0-alpha.9.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | < 8.6.9 | 8.6.9 |
parse-servernpm | >= 9.0.0-alpha.1, < 9.5.0-alpha.9 | 9.5.0-alpha.9 |
Affected products
1- Range: < 8.6.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-hwx8-q9cg-mqmcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-30850ghsaADVISORY
- github.com/parse-community/parse-server/security/advisories/GHSA-hwx8-q9cg-mqmcghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.