Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29182: CWE-863: Incorrect Authorization in parse-community parse-server

0
High
VulnerabilityCVE-2026-29182cvecve-2026-29182cwe-863
Published: Fri Mar 06 2026 (03/06/2026, 20:24:10 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.4 and 9.4.1-alpha.3, Parse Server's readOnlyMasterKey option allows access with master-level read privileges but is documented to deny all write operations. However, some endpoints incorrectly accept the readOnlyMasterKey for mutating operations. This allows a caller who only holds the readOnlyMasterKey to create, modify, and delete Cloud Hooks and to start Cloud Jobs, which can be used for data exfiltration. Any Parse Server deployment that uses the readOnlyMasterKey option is affected. Note than an attacker needs to know the readOnlyMasterKey to exploit this vulnerability. This issue has been patched in versions 8.6.4 and 9.4.1-alpha.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:45:13 UTC

Technical Analysis

Parse Server is an open-source backend framework running on Node.js, widely used for mobile and web applications. It supports a readOnlyMasterKey option designed to provide master-level read access while denying write operations, thereby limiting the scope of access for certain administrative tasks. However, in versions prior to 8.6.4 and 9.4.1-alpha.3, some API endpoints erroneously accept the readOnlyMasterKey for mutating operations, violating the intended access control policy (CWE-863: Incorrect Authorization). This flaw enables an attacker who has obtained the readOnlyMasterKey to perform unauthorized write actions such as creating, modifying, or deleting Cloud Hooks and initiating Cloud Jobs. These capabilities can be leveraged to execute arbitrary code or exfiltrate sensitive data from the backend. The vulnerability does not require user interaction and can be exploited remotely over the network without additional privileges beyond possession of the readOnlyMasterKey. The issue was publicly disclosed and assigned CVE-2026-29182 with a CVSS v4.0 base score of 8.6 (high severity), reflecting its significant impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all deployments using the readOnlyMasterKey option on vulnerable versions, emphasizing the importance of upgrading to patched releases 8.6.4 or 9.4.1-alpha.3 to remediate the risk.

Potential Impact

The vulnerability allows attackers with the readOnlyMasterKey to bypass intended authorization restrictions and perform unauthorized write operations on the Parse Server backend. This can lead to unauthorized creation or modification of Cloud Hooks and Cloud Jobs, which are mechanisms that can execute arbitrary backend code or trigger workflows. Consequently, attackers can manipulate backend logic, exfiltrate sensitive data, or disrupt service availability. The compromise of Cloud Hooks and Jobs can also facilitate persistent access or lateral movement within the affected infrastructure. Since the readOnlyMasterKey is a high-privilege credential, its exposure combined with this flaw significantly elevates the risk of data breaches and operational disruption. Organizations relying on Parse Server for critical applications may face data confidentiality violations, integrity breaches, and potential service outages. The ease of remote exploitation without user interaction further exacerbates the threat, making timely patching essential to prevent exploitation.

Mitigation Recommendations

1. Upgrade all Parse Server deployments to version 8.6.4 or later, or 9.4.1-alpha.3 or later, where the vulnerability is patched. 2. Immediately audit and rotate the readOnlyMasterKey to invalidate any potentially compromised keys. 3. Restrict access to the readOnlyMasterKey by enforcing strict access controls and limiting its distribution only to trusted administrators and systems. 4. Monitor logs and Cloud Hook/Job activities for unusual or unauthorized operations that could indicate exploitation attempts. 5. Implement network-level protections such as IP whitelisting and firewall rules to limit access to Parse Server endpoints. 6. Consider disabling the readOnlyMasterKey option if not strictly necessary or use alternative access control mechanisms with more granular permissions. 7. Conduct regular security reviews and penetration testing focused on authorization controls within Parse Server deployments. 8. Educate developers and administrators about the risks of key exposure and the importance of secure key management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T14:44:00.713Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab3d0ec48b3f10ffd4f2cd

Added to database: 3/6/2026, 8:46:06 PM

Last enriched: 3/14/2026, 7:45:13 PM

Last updated: 4/21/2026, 2:29:13 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses