CVE-2026-34363
Published:March 31, 2026
Updated:April 08, 2026
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.65 and 9.7.0-alpha.9, when multiple clients subscribe to the same class via LiveQuery, the event handlers process each subscriber concurrently using shared mutable objects. The sensitive data filter modifies these shared objects in-place, so when one subscriber's filter removes a protected field, subsequent subscribers may receive the already-filtered object. This can cause protected fields and authentication data to leak to clients that should not see them, or cause clients that should see the data to receive an incomplete object. Additionally, when an afterEvent Cloud Code trigger is registered, one subscriber's trigger modifications can leak to other subscribers through the same shared mutable state. Any Parse Server deployment using LiveQuery with protected fields or afterEvent triggers is affected when multiple clients subscribe to the same class. This issue has been patched in versions 8.6.65 and 9.7.0-alpha.9.
Affected Packages
https://github.com/parse-community/parse-server.git (GITHUB):
Affected version(s) >=2.0.0 <8.6.65Fix Suggestion:
Update to version 8.6.65https://github.com/parse-community/parse-server.git (GITHUB):
Affected version(s) >=9.0.0 <9.7.0-alpha.9Fix Suggestion:
Update to version 9.7.0-alpha.9parse-server (NPM):
Affected version(s) >=9.0.0 <9.7.0-alpha.9Fix Suggestion:
Update to version 9.7.0-alpha.9parse-server (NPM):
Affected version(s) >=1.0.0 <8.6.65Fix Suggestion:
Update to version 8.6.65Related Resources (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.2
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
EPSS
Base Score:
0.04