Description
An attacker can use a dot-notation field name in combination with the sort query parameter to inject SQL into the PostgreSQL database through an improper escaping of sub-field values in dot-notation queries. The vulnerability may also affect queries that use dot-notation field names with the distinct and where query parameters.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.28 >= 9.0.0, < 9.6.0-alpha.2** Patched version(s): **8.6.28 9.6.0-alpha.2**
References
Related Issues
- Parse Server vulnerable to SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL - CVE-2026-31871
- Parse Server has a SQL injection via query field name when using PostgreSQL - CVE-2026-32234
- Parse Server vulnerable to SQL injection via `Increment` operation on nested object field in PostgreSQL - CVE-2026-31856
- Parse Server has SQL Injection through aggregate and distinct field names in PostgreSQL adapter - CVE-2026-33539
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 11, 2026