Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32594: CWE-306: Missing Authentication for Critical Function in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-32594cvecve-2026-32594cwe-306
Published: Fri Mar 13 2026 (03/13/2026, 19:56:42 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.40 and 9.6.0-alpha.14, the GraphQL WebSocket endpoint for subscriptions does not pass requests through the Express middleware chain that enforces authentication, introspection control, and query complexity limits. An attacker can connect to the WebSocket endpoint and execute GraphQL operations without providing a valid application or API key, access the GraphQL schema via introspection even when public introspection is disabled, and send arbitrarily complex queries that bypass configured complexity limits. This vulnerability is fixed in 8.6.40 and 9.6.0-alpha.14.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:41:22 UTC

Technical Analysis

Parse Server is an open-source backend framework running on Node.js, widely used for building applications with GraphQL APIs. CVE-2026-32594 arises because the GraphQL WebSocket endpoint handling subscriptions does not pass requests through the Express middleware chain responsible for enforcing authentication, introspection controls, and query complexity limits. This omission means that any client can connect to the WebSocket endpoint and perform GraphQL operations without providing a valid application or API key. Additionally, the vulnerability allows attackers to perform schema introspection even when public introspection is disabled, revealing sensitive schema details. Attackers can also submit arbitrarily complex queries that bypass configured complexity limits, potentially leading to resource exhaustion and denial of service. The vulnerability affects parse-server versions >=9.0.0 and <9.6.0-alpha.14, as well as versions below 8.6.40. The issue is fixed in versions 8.6.40 and 9.6.0-alpha.14 by ensuring the WebSocket endpoint properly enforces middleware authentication and query controls. The CVSS 4.0 score is 6.9 (medium), reflecting network exploitability without authentication or user interaction, with limited confidentiality and availability impact but no integrity impact. No known exploits are currently reported in the wild.

Potential Impact

This vulnerability allows unauthenticated remote attackers to access critical backend functions via the GraphQL WebSocket endpoint. The primary impacts include unauthorized data exposure through schema introspection, which can aid further attacks, and the ability to execute arbitrary GraphQL queries without restriction. The bypass of query complexity limits can lead to resource exhaustion, causing denial of service conditions affecting availability. Organizations relying on parse-server for backend services risk data leakage and service disruption. Since authentication is bypassed, attackers do not need valid credentials, increasing the attack surface. The impact is particularly significant for applications exposing sensitive data or operating in multi-tenant environments. While no integrity impact is noted, the confidentiality and availability risks can lead to reputational damage, regulatory non-compliance, and operational downtime.

Mitigation Recommendations

1. Upgrade parse-server to version 8.6.40 or later, or 9.6.0-alpha.14 or later, where the vulnerability is patched. 2. If immediate upgrade is not possible, restrict network access to the GraphQL WebSocket endpoint using firewall rules or network segmentation to limit exposure to trusted clients only. 3. Implement WebSocket-level authentication proxies or gateways that enforce authentication and query complexity limits before requests reach parse-server. 4. Monitor GraphQL subscription traffic for unusual patterns, such as excessive query complexity or unexpected schema introspection requests. 5. Regularly audit parse-server configurations to ensure introspection is disabled in production environments unless explicitly required. 6. Employ rate limiting and resource quotas on GraphQL endpoints to mitigate potential denial of service attacks. 7. Educate development and operations teams about this vulnerability and ensure secure deployment practices for parse-server instances.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b473bd2f860ef943aa940d

Added to database: 3/13/2026, 8:29:49 PM

Last enriched: 3/21/2026, 12:41:22 AM

Last updated: 4/28/2026, 3:07:39 AM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses