CVE-2026-33163

EUVD-2026-12994
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.35 and 8.6.50, when a `Parse.Cloud.afterLiveQueryEvent` trigger is registered for a class, the LiveQuery server leaks protected fields and `authData` to all subscribers of that class. Fields configured as protected via Class-Level Permissions (`protectedFields`) are included in LiveQuery event payloads for all event types (create, update, delete, enter, leave). Any user with sufficient CLP permissions to subscribe to the affected class can receive protected field data of other users, including sensitive personal information and OAuth tokens from third-party authentication providers. The vulnerability was caused by a reference detachment bug. When an `afterEvent` trigger is registered, the LiveQuery server converts the event object to a `Parse.Object` for the trigger, then creates a new JSON copy via `toJSONwithObjects()`. The sensitive data filter was applied to the `Parse.Object` reference, but the unfiltered JSON copy was sent to clients. The fix in versions 9.6.0-alpha.35 and 8.6.50 ensures that the JSON copy is assigned back to the response object before filtering, so the filter operates on the actual data sent to clients. As a workaround, remove all `Parse.Cloud.afterLiveQueryEvent` trigger registrations. Without an `afterEvent` trigger, the reference detachment does not occur and protected fields are correctly filtered.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
Affected Products (NVD)
VendorProductVersion
parseplatformparse-server
𝑥
< 8.6.50
parseplatformparse-server
9.0.0 ≤
𝑥
< 9.6.0
parseplatformparse-server
9.6.0:alpha1
parseplatformparse-server
9.6.0:alpha10
parseplatformparse-server
9.6.0:alpha11
parseplatformparse-server
9.6.0:alpha12
parseplatformparse-server
9.6.0:alpha13
parseplatformparse-server
9.6.0:alpha14
parseplatformparse-server
9.6.0:alpha15
parseplatformparse-server
9.6.0:alpha16
parseplatformparse-server
9.6.0:alpha17
parseplatformparse-server
9.6.0:alpha18
parseplatformparse-server
9.6.0:alpha19
parseplatformparse-server
9.6.0:alpha2
parseplatformparse-server
9.6.0:alpha20
parseplatformparse-server
9.6.0:alpha21
parseplatformparse-server
9.6.0:alpha22
parseplatformparse-server
9.6.0:alpha23
parseplatformparse-server
9.6.0:alpha24
parseplatformparse-server
9.6.0:alpha25
parseplatformparse-server
9.6.0:alpha26
parseplatformparse-server
9.6.0:alpha27
parseplatformparse-server
9.6.0:alpha28
parseplatformparse-server
9.6.0:alpha29
parseplatformparse-server
9.6.0:alpha3
parseplatformparse-server
9.6.0:alpha30
parseplatformparse-server
9.6.0:alpha31
parseplatformparse-server
9.6.0:alpha32
parseplatformparse-server
9.6.0:alpha33
parseplatformparse-server
9.6.0:alpha34
parseplatformparse-server
9.6.0:alpha4
parseplatformparse-server
9.6.0:alpha5
parseplatformparse-server
9.6.0:alpha6
parseplatformparse-server
9.6.0:alpha7
parseplatformparse-server
9.6.0:alpha8
parseplatformparse-server
9.6.0:alpha9
𝑥
= Vulnerable software versions