High severityNVD Advisory· Published Mar 11, 2026· Updated Mar 12, 2026
Parse Server has a protected fields bypass via dot-notation in query and sort
CVE-2026-31872
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.6 and 8.6.32, the protectedFields class-level permission (CLP) can be bypassed using dot-notation in query WHERE clauses and sort parameters. An attacker can use dot-notation to query or sort by sub-fields of a protected field, enabling a binary oracle attack to enumerate protected field values. This affects both MongoDB and PostgreSQL deployments. This vulnerability is fixed in 9.6.0-alpha.6 and 8.6.32.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | >= 9.0.0-alpha.1, < 9.6.0-alpha.6 | 9.6.0-alpha.6 |
parse-servernpm | < 8.6.32 | 8.6.32 |
Affected products
1- Range: >= 9.0.0 < 9.6.0-alpha.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-r2m8-pxm9-9c4gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-31872ghsaADVISORY
- github.com/parse-community/parse-server/releases/tag/8.6.32ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/releases/tag/9.6.0-alpha.6ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-r2m8-pxm9-9c4gghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.