Parse Server has a protected field change detection oracle via LiveQuery watch parameter
- Severity:
- Medium
Description
An attacker can subscribe to LiveQuery with a watch parameter targeting a protected field. Although the protected field value is properly stripped from event payloads, the presence or absence of update events reveals whether the protected field changed, creating a binary oracle.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.54 >= 9.0.0, < 9.6.0-alpha.43** Patched version(s): **8.6.54 9.6.0-alpha.43**
References
Related Issues
- Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause - CVE-2026-32098
- Parse Server has a protected fields bypass via dot-notation in query and sort - CVE-2026-31872
- Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries - CVE-2026-32728
- Parse Server has Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery - CVE-2026-30925
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 20, 2026