Parse Server has a protected fields bypass via dot-notation in query and sort
High severity
GitHub Reviewed
Published
Mar 10, 2026
in
parse-community/parse-server
•
Updated Mar 11, 2026
Package
Affected versions
>= 9.0.0-alpha.1, < 9.6.0-alpha.6
< 8.6.32
Patched versions
9.6.0-alpha.6
8.6.32
Description
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Published by the National Vulnerability Database
Mar 11, 2026
Last updated
Mar 11, 2026
Impact
The
protectedFieldsclass-level permission (CLP) can be bypassed using dot-notation in query WHERE clauses and sort parameters. An attacker can use dot-notation to query or sort by sub-fields of a protected field, enabling a binary oracle attack to enumerate protected field values.This affects both MongoDB and PostgreSQL deployments.
Patches
The fix ensures that query WHERE clause keys and sort keys are checked against protected fields by extracting the root field from dot-notation paths. For example, a query on
secretObj.apiKeyis now correctly blocked whensecretObjis a protected field.Workarounds
None.
References
References