Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31800: CWE-862: Missing Authorization in parse-community parse-server

0
High
VulnerabilityCVE-2026-31800cvecve-2026-31800cwe-862
Published: Tue Mar 10 2026 (03/10/2026, 20:51:14 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.12 and 8.6.25, the _GraphQLConfig and _Audience internal classes can be read, modified, and deleted via the generic /classes/_GraphQLConfig and /classes/_Audience REST API routes without master key authentication. This bypasses the master key enforcement that exists on the dedicated /graphql-config and /push_audiences endpoints. An attacker can read, modify and delete GraphQL configuration and push audience data. This vulnerability is fixed in 9.5.2-alpha.12 and 8.6.25.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:14:37 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js and provides REST API endpoints for managing application data and configurations. CVE-2026-31800 is a vulnerability classified under CWE-862 (Missing Authorization) affecting parse-server versions >= 9.0.0 and < 9.5.2-alpha.12, as well as versions below 8.6.25. The issue arises because the internal classes _GraphQLConfig and _Audience, which control GraphQL configurations and push notification audience data respectively, are accessible via generic REST API routes (/classes/_GraphQLConfig and /classes/_Audience) without enforcing master key authentication. This is in contrast to the dedicated endpoints (/graphql-config and /push_audiences) that do enforce master key checks. As a result, an unauthenticated attacker can read sensitive configuration data, modify it, or delete it entirely, potentially disrupting application functionality or exposing sensitive information. The vulnerability does not require any privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, with high impact on integrity and confidentiality, and low impact on availability. The flaw was fixed in parse-server versions 9.5.2-alpha.12 and 8.6.25. No public exploits have been reported yet, but the ease of exploitation and high impact make this a critical issue for affected deployments.

Potential Impact

The vulnerability allows attackers to bypass master key authentication and gain unauthorized access to critical internal configuration data. This can lead to unauthorized disclosure of sensitive GraphQL schema and push audience information, compromising confidentiality. Attackers can also modify or delete these configurations, potentially causing denial of service or manipulation of application behavior, impacting integrity and availability. Organizations relying on parse-server for backend services may face data breaches, service disruptions, or loss of user trust. Since no authentication is required, automated attacks can be launched at scale, increasing the risk of widespread exploitation. The impact is particularly severe for applications that use GraphQL extensively or rely on push notifications for user engagement, as attackers can alter these mechanisms to their advantage.

Mitigation Recommendations

The primary mitigation is to upgrade parse-server to version 9.5.2-alpha.12 or later, or 8.6.25 or later, where the authorization checks on the generic REST API routes have been properly enforced. Until upgrades can be applied, organizations should implement network-level access controls to restrict access to parse-server REST API endpoints, especially the /classes/_GraphQLConfig and /classes/_Audience routes. Deploying Web Application Firewalls (WAFs) with rules to block unauthorized access to these endpoints can reduce exposure. Additionally, monitoring API access logs for unusual or unauthorized requests targeting these internal classes can help detect exploitation attempts early. Developers should audit custom API routes and ensure that all sensitive endpoints enforce proper authentication and authorization. Finally, consider isolating parse-server instances behind VPNs or private networks to limit exposure to untrusted actors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T16:33:42.913Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b0864c2f860ef943bbb075

Added to database: 3/10/2026, 8:59:56 PM

Last enriched: 3/10/2026, 9:14:37 PM

Last updated: 3/13/2026, 10:08:08 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses