CVE-2026-31800

EUVD-2026-10888
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.12 and 8.6.25, the _GraphQLConfig and _Audience internal classes can be read, modified, and deleted via the generic /classes/_GraphQLConfig and /classes/_Audience REST API routes without master key authentication. This bypasses the master key enforcement that exists on the dedicated /graphql-config and /push_audiences endpoints. An attacker can read, modify and delete GraphQL configuration and push audience data. This vulnerability is fixed in 9.5.2-alpha.12 and 8.6.25.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
parseplatformparse-server
𝑥
< 8.6.25
parseplatformparse-server
9.0.0 ≤
𝑥
< 9.5.2
parseplatformparse-server
9.5.2:alpha1
parseplatformparse-server
9.5.2:alpha10
parseplatformparse-server
9.5.2:alpha11
parseplatformparse-server
9.5.2:alpha2
parseplatformparse-server
9.5.2:alpha3
parseplatformparse-server
9.5.2:alpha4
parseplatformparse-server
9.5.2:alpha5
parseplatformparse-server
9.5.2:alpha6
parseplatformparse-server
9.5.2:alpha7
parseplatformparse-server
9.5.2:alpha8
parseplatformparse-server
9.5.2:alpha9
𝑥
= Vulnerable software versions