Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33163: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in parse-community parse-server

0
High
VulnerabilityCVE-2026-33163cvecve-2026-33163cwe-200
Published: Wed Mar 18 2026 (03/18/2026, 21:58:04 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.35 and 8.6.50, when a `Parse.Cloud.afterLiveQueryEvent` trigger is registered for a class, the LiveQuery server leaks protected fields and `authData` to all subscribers of that class. Fields configured as protected via Class-Level Permissions (`protectedFields`) are included in LiveQuery event payloads for all event types (create, update, delete, enter, leave). Any user with sufficient CLP permissions to subscribe to the affected class can receive protected field data of other users, including sensitive personal information and OAuth tokens from third-party authentication providers. The vulnerability was caused by a reference detachment bug. When an `afterEvent` trigger is registered, the LiveQuery server converts the event object to a `Parse.Object` for the trigger, then creates a new JSON copy via `toJSONwithObjects()`. The sensitive data filter was applied to the `Parse.Object` reference, but the unfiltered JSON copy was sent to clients. The fix in versions 9.6.0-alpha.35 and 8.6.50 ensures that the JSON copy is assigned back to the response object before filtering, so the filter operates on the actual data sent to clients. As a workaround, remove all `Parse.Cloud.afterLiveQueryEvent` trigger registrations. Without an `afterEvent` trigger, the reference detachment does not occur and protected fields are correctly filtered.

AI-Powered Analysis

AILast updated: 03/18/2026, 22:27:42 UTC

Technical Analysis

Parse Server is an open-source backend platform running on Node.js, widely used for mobile and web applications. In versions prior to 9.6.0-alpha.35 and 8.6.50, a vulnerability (CVE-2026-33163) exists in the LiveQuery server component when a Parse.Cloud.afterLiveQueryEvent trigger is registered for a class. LiveQuery allows clients to subscribe to real-time updates on data objects. The vulnerability arises because the server creates a Parse.Object for the event and then generates a JSON copy via toJSONwithObjects(). The sensitive data filtering mechanism is applied only to the original Parse.Object reference, not the JSON copy actually sent to clients. Consequently, protected fields configured via Class-Level Permissions (protectedFields), including sensitive personal data and OAuth tokens in authData, are leaked to all subscribers of that class’s LiveQuery events (create, update, delete, enter, leave). This exposure occurs without requiring authentication or user interaction, only subscription permissions to the class. The root cause is a reference detachment bug in the event processing logic. The fix implemented in versions 9.6.0-alpha.35 and 8.6.50 ensures the JSON copy is reassigned to the response object before filtering, so the filter operates on the data sent to clients. As an immediate mitigation, removing all afterLiveQueryEvent triggers prevents the detachment and thus the leak. No known exploits are reported in the wild yet, but the vulnerability has a CVSS 4.0 score of 8.2 (high severity) due to the ease of exploitation and sensitive data exposure.

Potential Impact

This vulnerability can lead to unauthorized disclosure of sensitive user information, including personal data and OAuth tokens from third-party authentication providers. Such exposure can facilitate identity theft, account takeover, and unauthorized access to third-party services. Organizations using affected parse-server versions with LiveQuery and afterLiveQueryEvent triggers risk significant confidentiality breaches. The leak affects all subscribers with sufficient Class-Level Permissions, potentially including malicious insiders or compromised accounts. Since OAuth tokens are exposed, attackers could escalate privileges or pivot to other systems. The vulnerability does not impact data integrity or availability directly but severely compromises confidentiality. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR), and cause financial losses. The ease of exploitation and lack of required user interaction increase the risk of widespread abuse once exploited.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 9.6.0-alpha.35 or later, or 8.6.50 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, remove all Parse.Cloud.afterLiveQueryEvent trigger registrations to prevent the reference detachment bug and stop sensitive data leakage. Review Class-Level Permissions and minimize subscription permissions to only trusted users. Audit LiveQuery usage and monitor for unusual subscription activity. Implement additional application-layer encryption or token obfuscation if possible to reduce impact of leaks. Regularly review and rotate OAuth tokens and credentials to limit exposure duration. Stay updated with parse-community advisories for any further patches or mitigations. Consider isolating LiveQuery servers or restricting network access to trusted clients to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2382771bdb1749c98987

Added to database: 3/18/2026, 10:13:22 PM

Last enriched: 3/18/2026, 10:27:42 PM

Last updated: 3/19/2026, 6:57:04 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses