Parse Server has a protected fields bypass via dot-notation in query and sort
- Severity:
- High
Description
The protectedFields class-level permission (CLP) can be bypassed using dot-notation in query WHERE clauses and sort parameters. An attacker can use dot-notation to query or sort by sub-fields of a protected field, enabling a binary oracle attack to enumerate protected field values.
This affects both MongoDB and PostgreSQL deployments.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.32 >= 9.0.0-alpha.1, < 9.6.0-alpha.6** Patched version(s): **8.6.32 9.6.0-alpha.6**
References
Related Issues
- Parse Server has a protected fields bypass via logical query operators - CVE-2026-30962
- Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause - CVE-2026-32098
- Parse Server has a query condition depth bypass via pre-validation transform pipeline - CVE-2026-33498
- Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution - CVE-2026-30939
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 11, 2026