Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33163: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in parse-community parse-server

0
High
VulnerabilityCVE-2026-33163cvecve-2026-33163cwe-200
Published: Wed Mar 18 2026 (03/18/2026, 21:58:04 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-33163 is a high-severity vulnerability in parse-community's parse-server that causes exposure of protected fields and authentication data to unauthorized subscribers of LiveQuery events. The flaw arises when a Parse. Cloud. afterLiveQueryEvent trigger is registered, causing the LiveQuery server to send unfiltered JSON data including sensitive personal information and OAuth tokens to all subscribers of a class. This occurs due to a reference detachment bug where filtering is applied to an object reference but not to the actual JSON payload sent to clients. The vulnerability affects parse-server versions >= 9. 0. 0 and < 9. 6. 0-alpha.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:19:14 UTC

Technical Analysis

Parse Server is an open-source backend platform that supports LiveQuery, enabling real-time data updates to clients subscribed to specific classes. In versions prior to 9.6.0-alpha.35 and 8.6.50, a critical vulnerability (CVE-2026-33163) exists due to improper handling of sensitive data during LiveQuery event processing when a Parse.Cloud.afterLiveQueryEvent trigger is registered. The vulnerability stems from a reference detachment bug: the LiveQuery server converts the event object to a Parse.Object for the trigger and creates a new JSON copy via toJSONwithObjects(). While the sensitive data filter is applied to the Parse.Object reference, the unfiltered JSON copy is sent to all subscribers, leaking protected fields configured via Class-Level Permissions (CLP) and authData, including OAuth tokens from third-party providers. This means any user with sufficient CLP permissions to subscribe to the affected class can receive sensitive information of other users. The root cause is that filtering is applied before the JSON copy is assigned back to the response object, allowing unfiltered data to be transmitted. The fix implemented in versions 9.6.0-alpha.35 and 8.6.50 ensures the JSON copy is assigned back before filtering, so the filter operates on the actual data sent to clients. As a workaround, removing all afterLiveQueryEvent triggers prevents the reference detachment and ensures proper filtering. No known exploits are currently reported in the wild. The vulnerability is tracked under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS 4.0 base score of 8.2, reflecting high severity with network attack vector, low attack complexity, no user interaction, and no privileges required.

Potential Impact

The vulnerability allows unauthorized subscribers of LiveQuery events to receive sensitive protected fields and authentication data, including OAuth tokens, belonging to other users. This exposure can lead to significant confidentiality breaches, enabling attackers to impersonate users, access third-party services, or escalate privileges within the affected application. Organizations relying on parse-server for backend services, especially those using LiveQuery with afterLiveQueryEvent triggers, risk data leakage that can compromise user privacy and trust. The impact extends to any application handling sensitive personal information or authentication credentials, potentially resulting in regulatory non-compliance, reputational damage, and financial loss. Since exploitation requires no authentication or user interaction, attackers can remotely and easily access sensitive data if they can subscribe to the affected LiveQuery classes. The scope includes all parse-server deployments running vulnerable versions with afterLiveQueryEvent triggers registered, which may be widespread given parse-server's popularity in mobile and web app backends.

Mitigation Recommendations

1. Upgrade parse-server to version 9.6.0-alpha.35 or later, or 8.6.50 or later, where the vulnerability is fixed. 2. If immediate upgrade is not possible, remove all Parse.Cloud.afterLiveQueryEvent trigger registrations to prevent the reference detachment bug and ensure proper filtering of protected fields. 3. Review Class-Level Permissions (CLP) and protectedFields configurations to minimize exposure of sensitive data to subscribers. 4. Audit LiveQuery subscriptions and monitor for unusual subscription patterns that could indicate exploitation attempts. 5. Implement network-level access controls to restrict who can subscribe to LiveQuery events, limiting exposure to trusted clients. 6. Conduct thorough testing after upgrades or configuration changes to verify that protected fields and authData are no longer leaked in LiveQuery payloads. 7. Educate development teams about secure use of LiveQuery triggers and the importance of applying patches promptly. 8. Consider additional application-layer encryption or tokenization of sensitive data fields to reduce impact if leaks occur.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2382771bdb1749c98987

Added to database: 3/18/2026, 10:13:22 PM

Last enriched: 3/26/2026, 1:19:14 AM

Last updated: 4/30/2026, 4:24:55 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses