CVE-2026-31800: CWE-862: Missing Authorization in parse-community parse-server
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.12 and 8.6.25, the _GraphQLConfig and _Audience internal classes can be read, modified, and deleted via the generic /classes/_GraphQLConfig and /classes/_Audience REST API routes without master key authentication. This bypasses the master key enforcement that exists on the dedicated /graphql-config and /push_audiences endpoints. An attacker can read, modify and delete GraphQL configuration and push audience data. This vulnerability is fixed in 9.5.2-alpha.12 and 8.6.25.
AI Analysis
Technical Summary
Parse Server is an open-source backend framework that runs on Node.js and provides REST API endpoints for managing application data and configurations. CVE-2026-31800 is a vulnerability classified under CWE-862 (Missing Authorization) affecting parse-server versions >= 9.0.0 and < 9.5.2-alpha.12, as well as versions below 8.6.25. The issue arises because the internal classes _GraphQLConfig and _Audience, which control GraphQL configurations and push notification audience data respectively, are accessible via generic REST API routes (/classes/_GraphQLConfig and /classes/_Audience) without enforcing master key authentication. This is in contrast to the dedicated endpoints (/graphql-config and /push_audiences) that do enforce master key checks. As a result, an unauthenticated attacker can read sensitive configuration data, modify it, or delete it entirely, potentially disrupting application functionality or exposing sensitive information. The vulnerability does not require any privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, with high impact on integrity and confidentiality, and low impact on availability. The flaw was fixed in parse-server versions 9.5.2-alpha.12 and 8.6.25. No public exploits have been reported yet, but the ease of exploitation and high impact make this a critical issue for affected deployments.
Potential Impact
The vulnerability allows attackers to bypass master key authentication and gain unauthorized access to critical internal configuration data. This can lead to unauthorized disclosure of sensitive GraphQL schema and push audience information, compromising confidentiality. Attackers can also modify or delete these configurations, potentially causing denial of service or manipulation of application behavior, impacting integrity and availability. Organizations relying on parse-server for backend services may face data breaches, service disruptions, or loss of user trust. Since no authentication is required, automated attacks can be launched at scale, increasing the risk of widespread exploitation. The impact is particularly severe for applications that use GraphQL extensively or rely on push notifications for user engagement, as attackers can alter these mechanisms to their advantage.
Mitigation Recommendations
The primary mitigation is to upgrade parse-server to version 9.5.2-alpha.12 or later, or 8.6.25 or later, where the authorization checks on the generic REST API routes have been properly enforced. Until upgrades can be applied, organizations should implement network-level access controls to restrict access to parse-server REST API endpoints, especially the /classes/_GraphQLConfig and /classes/_Audience routes. Deploying Web Application Firewalls (WAFs) with rules to block unauthorized access to these endpoints can reduce exposure. Additionally, monitoring API access logs for unusual or unauthorized requests targeting these internal classes can help detect exploitation attempts early. Developers should audit custom API routes and ensure that all sensitive endpoints enforce proper authentication and authorization. Finally, consider isolating parse-server instances behind VPNs or private networks to limit exposure to untrusted actors.
Affected Countries
United States, Germany, United Kingdom, India, Canada, Australia, France, Brazil, Japan, Netherlands
CVE-2026-31800: CWE-862: Missing Authorization in parse-community parse-server
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.12 and 8.6.25, the _GraphQLConfig and _Audience internal classes can be read, modified, and deleted via the generic /classes/_GraphQLConfig and /classes/_Audience REST API routes without master key authentication. This bypasses the master key enforcement that exists on the dedicated /graphql-config and /push_audiences endpoints. An attacker can read, modify and delete GraphQL configuration and push audience data. This vulnerability is fixed in 9.5.2-alpha.12 and 8.6.25.
AI-Powered Analysis
Technical Analysis
Parse Server is an open-source backend framework that runs on Node.js and provides REST API endpoints for managing application data and configurations. CVE-2026-31800 is a vulnerability classified under CWE-862 (Missing Authorization) affecting parse-server versions >= 9.0.0 and < 9.5.2-alpha.12, as well as versions below 8.6.25. The issue arises because the internal classes _GraphQLConfig and _Audience, which control GraphQL configurations and push notification audience data respectively, are accessible via generic REST API routes (/classes/_GraphQLConfig and /classes/_Audience) without enforcing master key authentication. This is in contrast to the dedicated endpoints (/graphql-config and /push_audiences) that do enforce master key checks. As a result, an unauthenticated attacker can read sensitive configuration data, modify it, or delete it entirely, potentially disrupting application functionality or exposing sensitive information. The vulnerability does not require any privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, with high impact on integrity and confidentiality, and low impact on availability. The flaw was fixed in parse-server versions 9.5.2-alpha.12 and 8.6.25. No public exploits have been reported yet, but the ease of exploitation and high impact make this a critical issue for affected deployments.
Potential Impact
The vulnerability allows attackers to bypass master key authentication and gain unauthorized access to critical internal configuration data. This can lead to unauthorized disclosure of sensitive GraphQL schema and push audience information, compromising confidentiality. Attackers can also modify or delete these configurations, potentially causing denial of service or manipulation of application behavior, impacting integrity and availability. Organizations relying on parse-server for backend services may face data breaches, service disruptions, or loss of user trust. Since no authentication is required, automated attacks can be launched at scale, increasing the risk of widespread exploitation. The impact is particularly severe for applications that use GraphQL extensively or rely on push notifications for user engagement, as attackers can alter these mechanisms to their advantage.
Mitigation Recommendations
The primary mitigation is to upgrade parse-server to version 9.5.2-alpha.12 or later, or 8.6.25 or later, where the authorization checks on the generic REST API routes have been properly enforced. Until upgrades can be applied, organizations should implement network-level access controls to restrict access to parse-server REST API endpoints, especially the /classes/_GraphQLConfig and /classes/_Audience routes. Deploying Web Application Firewalls (WAFs) with rules to block unauthorized access to these endpoints can reduce exposure. Additionally, monitoring API access logs for unusual or unauthorized requests targeting these internal classes can help detect exploitation attempts early. Developers should audit custom API routes and ensure that all sensitive endpoints enforce proper authentication and authorization. Finally, consider isolating parse-server instances behind VPNs or private networks to limit exposure to untrusted actors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-09T16:33:42.913Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b0864c2f860ef943bbb075
Added to database: 3/10/2026, 8:59:56 PM
Last enriched: 3/10/2026, 9:14:37 PM
Last updated: 3/13/2026, 10:08:08 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.