Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32098: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-32098cvecve-2026-32098cwe-200
Published: Wed Mar 11 2026 (03/11/2026, 19:57:26 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-32098 is a medium-severity vulnerability in parse-community's parse-server affecting versions prior to 9. 6. 0-alpha. 9 and 8. 6. 35. It allows an unauthenticated attacker to infer values of protected fields by exploiting LiveQuery subscriptions with crafted WHERE clauses. The attacker uses boolean oracle techniques by observing LiveQuery event deliveries to leak sensitive information without direct access. This impacts any class with protectedFields configured in Class-Level Permissions and LiveQuery enabled. The vulnerability does not require authentication or user interaction and can be exploited remotely.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:30:12 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js, widely used for building mobile and web applications. The vulnerability CVE-2026-32098 arises from the way LiveQuery subscriptions handle queries involving protected fields. LiveQuery allows clients to subscribe to real-time updates on database objects. In affected versions (>=9.0.0 and <9.6.0-alpha.9, and <8.6.35), an attacker can craft a subscription with a WHERE clause referencing protected fields, including through dot-notation or regular expressions. Although these fields are protected and not directly exposed, the attacker can infer their values by monitoring whether LiveQuery events are triggered for matching objects. This creates a side-channel or boolean oracle that leaks sensitive information without direct access to the data. The vulnerability exploits the interaction between Class-Level Permissions' protectedFields and LiveQuery's event delivery mechanism. No authentication or user interaction is required, and the attack can be performed remotely. The issue is resolved in parse-server versions 9.6.0-alpha.9 and 8.6.35 by correcting how LiveQuery handles protected fields in subscriptions to prevent information leakage.

Potential Impact

This vulnerability enables unauthorized actors to infer sensitive information from protected fields in parse-server databases, potentially exposing confidential user data or application secrets. Since parse-server is often used as a backend for mobile and web applications, data leakage can compromise user privacy, violate compliance requirements, and damage organizational reputation. The attack requires no authentication, increasing the risk of widespread exploitation. Although no direct data extraction occurs, the boolean oracle technique can reveal critical information over time, which attackers can leverage for further attacks such as social engineering, identity theft, or privilege escalation. Organizations relying on vulnerable parse-server versions face risks of data breaches and loss of trust. The impact is heightened for applications handling sensitive personal, financial, or proprietary data.

Mitigation Recommendations

Organizations should upgrade parse-server to version 9.6.0-alpha.9 or later, or 8.6.35 or later, where the vulnerability is fixed. Until upgrades are applied, administrators should consider disabling LiveQuery subscriptions on classes with protectedFields configured to prevent exploitation. Review and tighten Class-Level Permissions to minimize exposure of sensitive fields and restrict access where possible. Implement network-level controls such as IP whitelisting or VPN access to limit exposure of parse-server endpoints. Monitor LiveQuery subscription patterns and logs for suspicious activity indicative of probing or boolean oracle attacks. Conduct thorough security testing of parse-server deployments, especially when using LiveQuery features. Educate developers on secure configuration practices and the risks of exposing sensitive data via real-time subscriptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.853Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1cd382f860ef94372074b

Added to database: 3/11/2026, 8:14:48 PM

Last enriched: 3/11/2026, 8:30:12 PM

Last updated: 3/11/2026, 9:27:12 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses