Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30229: CWE-863: Incorrect Authorization in parse-community parse-server

0
High
VulnerabilityCVE-2026-30229cvecve-2026-30229cwe-863
Published: Fri Mar 06 2026 (03/06/2026, 20:26:53 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.6 and 9.5.0-alpha.4, the readOnlyMasterKey can call POST /loginAs to obtain a valid session token for any user. This allows a read-only credential to impersonate arbitrary users with full read and write access to their data. Any Parse Server deployment that uses readOnlyMasterKey is affected. This issue has been patched in versions 8.6.6 and 9.5.0-alpha.4.

AI-Powered Analysis

AILast updated: 03/06/2026, 21:00:24 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js and is widely used for mobile and web applications to manage user data and sessions. The vulnerability identified as CVE-2026-30229 stems from an incorrect authorization check (CWE-863) in the parse-server's handling of the readOnlyMasterKey credential. Normally, the readOnlyMasterKey is intended to provide limited, read-only access to data. However, in versions prior to 8.6.6 and 9.5.0-alpha.4, this key could be used to call the POST /loginAs endpoint, which is designed to create a session token for any user. This flaw effectively elevates the privileges of the readOnlyMasterKey, allowing it to impersonate any user and gain full read and write access to their data, violating the principle of least privilege. Exploitation requires possession of the readOnlyMasterKey but no further authentication or user interaction. The vulnerability is remotely exploitable over the network, making it a critical risk for exposed parse-server deployments. The issue has been addressed in the patched versions 8.6.6 and 9.5.0-alpha.4, which enforce proper authorization checks preventing misuse of the readOnlyMasterKey. No public exploits have been reported yet, but the high CVSS score of 8.5 reflects the significant risk posed by this vulnerability.

Potential Impact

This vulnerability allows attackers with access to the readOnlyMasterKey to fully impersonate any user, gaining unauthorized read and write access to sensitive data. For organizations, this can lead to data breaches, unauthorized data manipulation, and potential compromise of user accounts and privacy. Since parse-server is used as a backend for many mobile and web applications, exploitation could affect a broad range of services, potentially impacting customer trust and regulatory compliance. The ability to escalate privileges from read-only to full access undermines security controls and could facilitate further attacks such as data exfiltration, injection of malicious data, or disruption of service. The remote exploitability and lack of required user interaction increase the threat level, especially for deployments exposing parse-server endpoints to the internet. Organizations relying on the readOnlyMasterKey for limited access must consider this vulnerability critical and prioritize patching to avoid severe operational and reputational damage.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 8.6.6 or later, or 9.5.0-alpha.4 or later, where the vulnerability is patched. If upgrading is not immediately possible, restrict network access to the parse-server endpoints, especially the POST /loginAs endpoint, using firewalls or network segmentation to limit exposure. Review and rotate the readOnlyMasterKey credentials to prevent unauthorized use. Implement strict access controls and monitoring around key usage to detect anomalous activity indicative of exploitation attempts. Additionally, audit application logs for suspicious loginAs requests and session token creations. Consider disabling or restricting the use of the readOnlyMasterKey where feasible, or replacing it with more granular access controls. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to block unauthorized POST /loginAs calls. Finally, educate development and operations teams about the risks associated with master keys and enforce secure key management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T17:23:59.797Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab3d0ec48b3f10ffd4f2d7

Added to database: 3/6/2026, 8:46:06 PM

Last enriched: 3/6/2026, 9:00:24 PM

Last updated: 3/7/2026, 1:04:01 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses