CVE-2026-30229: CWE-863: Incorrect Authorization in parse-community parse-server
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.6 and 9.5.0-alpha.4, the readOnlyMasterKey can call POST /loginAs to obtain a valid session token for any user. This allows a read-only credential to impersonate arbitrary users with full read and write access to their data. Any Parse Server deployment that uses readOnlyMasterKey is affected. This issue has been patched in versions 8.6.6 and 9.5.0-alpha.4.
AI Analysis
Technical Summary
Parse Server is an open-source backend framework that runs on Node.js and is widely used for mobile and web applications to manage user data and sessions. The vulnerability identified as CVE-2026-30229 stems from an incorrect authorization check (CWE-863) in the parse-server's handling of the readOnlyMasterKey credential. Normally, the readOnlyMasterKey is intended to provide limited, read-only access to data. However, in versions prior to 8.6.6 and 9.5.0-alpha.4, this key could be used to call the POST /loginAs endpoint, which is designed to create a session token for any user. This flaw effectively elevates the privileges of the readOnlyMasterKey, allowing it to impersonate any user and gain full read and write access to their data, violating the principle of least privilege. Exploitation requires possession of the readOnlyMasterKey but no further authentication or user interaction. The vulnerability is remotely exploitable over the network, making it a critical risk for exposed parse-server deployments. The issue has been addressed in the patched versions 8.6.6 and 9.5.0-alpha.4, which enforce proper authorization checks preventing misuse of the readOnlyMasterKey. No public exploits have been reported yet, but the high CVSS score of 8.5 reflects the significant risk posed by this vulnerability.
Potential Impact
This vulnerability allows attackers with access to the readOnlyMasterKey to fully impersonate any user, gaining unauthorized read and write access to sensitive data. For organizations, this can lead to data breaches, unauthorized data manipulation, and potential compromise of user accounts and privacy. Since parse-server is used as a backend for many mobile and web applications, exploitation could affect a broad range of services, potentially impacting customer trust and regulatory compliance. The ability to escalate privileges from read-only to full access undermines security controls and could facilitate further attacks such as data exfiltration, injection of malicious data, or disruption of service. The remote exploitability and lack of required user interaction increase the threat level, especially for deployments exposing parse-server endpoints to the internet. Organizations relying on the readOnlyMasterKey for limited access must consider this vulnerability critical and prioritize patching to avoid severe operational and reputational damage.
Mitigation Recommendations
Organizations should immediately upgrade parse-server to version 8.6.6 or later, or 9.5.0-alpha.4 or later, where the vulnerability is patched. If upgrading is not immediately possible, restrict network access to the parse-server endpoints, especially the POST /loginAs endpoint, using firewalls or network segmentation to limit exposure. Review and rotate the readOnlyMasterKey credentials to prevent unauthorized use. Implement strict access controls and monitoring around key usage to detect anomalous activity indicative of exploitation attempts. Additionally, audit application logs for suspicious loginAs requests and session token creations. Consider disabling or restricting the use of the readOnlyMasterKey where feasible, or replacing it with more granular access controls. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to block unauthorized POST /loginAs calls. Finally, educate development and operations teams about the risks associated with master keys and enforce secure key management practices.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil
CVE-2026-30229: CWE-863: Incorrect Authorization in parse-community parse-server
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.6 and 9.5.0-alpha.4, the readOnlyMasterKey can call POST /loginAs to obtain a valid session token for any user. This allows a read-only credential to impersonate arbitrary users with full read and write access to their data. Any Parse Server deployment that uses readOnlyMasterKey is affected. This issue has been patched in versions 8.6.6 and 9.5.0-alpha.4.
AI-Powered Analysis
Technical Analysis
Parse Server is an open-source backend framework that runs on Node.js and is widely used for mobile and web applications to manage user data and sessions. The vulnerability identified as CVE-2026-30229 stems from an incorrect authorization check (CWE-863) in the parse-server's handling of the readOnlyMasterKey credential. Normally, the readOnlyMasterKey is intended to provide limited, read-only access to data. However, in versions prior to 8.6.6 and 9.5.0-alpha.4, this key could be used to call the POST /loginAs endpoint, which is designed to create a session token for any user. This flaw effectively elevates the privileges of the readOnlyMasterKey, allowing it to impersonate any user and gain full read and write access to their data, violating the principle of least privilege. Exploitation requires possession of the readOnlyMasterKey but no further authentication or user interaction. The vulnerability is remotely exploitable over the network, making it a critical risk for exposed parse-server deployments. The issue has been addressed in the patched versions 8.6.6 and 9.5.0-alpha.4, which enforce proper authorization checks preventing misuse of the readOnlyMasterKey. No public exploits have been reported yet, but the high CVSS score of 8.5 reflects the significant risk posed by this vulnerability.
Potential Impact
This vulnerability allows attackers with access to the readOnlyMasterKey to fully impersonate any user, gaining unauthorized read and write access to sensitive data. For organizations, this can lead to data breaches, unauthorized data manipulation, and potential compromise of user accounts and privacy. Since parse-server is used as a backend for many mobile and web applications, exploitation could affect a broad range of services, potentially impacting customer trust and regulatory compliance. The ability to escalate privileges from read-only to full access undermines security controls and could facilitate further attacks such as data exfiltration, injection of malicious data, or disruption of service. The remote exploitability and lack of required user interaction increase the threat level, especially for deployments exposing parse-server endpoints to the internet. Organizations relying on the readOnlyMasterKey for limited access must consider this vulnerability critical and prioritize patching to avoid severe operational and reputational damage.
Mitigation Recommendations
Organizations should immediately upgrade parse-server to version 8.6.6 or later, or 9.5.0-alpha.4 or later, where the vulnerability is patched. If upgrading is not immediately possible, restrict network access to the parse-server endpoints, especially the POST /loginAs endpoint, using firewalls or network segmentation to limit exposure. Review and rotate the readOnlyMasterKey credentials to prevent unauthorized use. Implement strict access controls and monitoring around key usage to detect anomalous activity indicative of exploitation attempts. Additionally, audit application logs for suspicious loginAs requests and session token creations. Consider disabling or restricting the use of the readOnlyMasterKey where feasible, or replacing it with more granular access controls. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to block unauthorized POST /loginAs calls. Finally, educate development and operations teams about the risks associated with master keys and enforce secure key management practices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T17:23:59.797Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ab3d0ec48b3f10ffd4f2d7
Added to database: 3/6/2026, 8:46:06 PM
Last enriched: 3/6/2026, 9:00:24 PM
Last updated: 3/7/2026, 1:04:01 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.