Parse Server has a protected fields bypass via logical query operators
High severity
GitHub Reviewed
Published
Mar 10, 2026
in
parse-community/parse-server
•
Updated Mar 11, 2026
Package
Affected versions
>= 9.0.0, < 9.5.2-alpha.6
< 8.6.19
Patched versions
9.5.2-alpha.6
8.6.19
Description
Published by the National Vulnerability Database
Mar 10, 2026
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Last updated
Mar 11, 2026
Impact
The validation for protected fields only checks top-level query keys. By wrapping a query constraint on a protected field inside a logical operator, the check is bypassed entirely. This allows any authenticated user to query on protected fields to extract field values.
All Parse Server deployments have default protected fields and are vulnerable.
Patches
The fix adds recursive validation of sub-queries with logical operators, consistent with the existing recursive validation patterns.
Workarounds
Use a
beforeFindtrigger on affected classes to manually inspect the query for protected field references in logical operator sub-queries and reject the request.References
References