CVE-2026-33429
EUVD-2026-1497024.03.2026, 19:16
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.54 and 9.6.0-alpha.43, an attacker can subscribe to LiveQuery with a watch parameter targeting a protected field. Although the protected field value is properly stripped from event payloads, the presence or absence of update events reveals whether the protected field changed, creating a binary oracle. For boolean protected fields, the timing of change events is equivalent to knowing the field value. This issue has been patched in versions 8.6.54 and 9.6.0-alpha.43.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| parseplatform | parse-server | 𝑥 < 8.6.54 |
| parseplatform | parse-server | 9.0.0 ≤ 𝑥 < 9.6.0 |
| parseplatform | parse-server | 9.6.0:alpha1 |
| parseplatform | parse-server | 9.6.0:alpha10 |
| parseplatform | parse-server | 9.6.0:alpha11 |
| parseplatform | parse-server | 9.6.0:alpha12 |
| parseplatform | parse-server | 9.6.0:alpha13 |
| parseplatform | parse-server | 9.6.0:alpha14 |
| parseplatform | parse-server | 9.6.0:alpha15 |
| parseplatform | parse-server | 9.6.0:alpha16 |
| parseplatform | parse-server | 9.6.0:alpha17 |
| parseplatform | parse-server | 9.6.0:alpha18 |
| parseplatform | parse-server | 9.6.0:alpha19 |
| parseplatform | parse-server | 9.6.0:alpha2 |
| parseplatform | parse-server | 9.6.0:alpha20 |
| parseplatform | parse-server | 9.6.0:alpha21 |
| parseplatform | parse-server | 9.6.0:alpha22 |
| parseplatform | parse-server | 9.6.0:alpha23 |
| parseplatform | parse-server | 9.6.0:alpha24 |
| parseplatform | parse-server | 9.6.0:alpha25 |
| parseplatform | parse-server | 9.6.0:alpha26 |
| parseplatform | parse-server | 9.6.0:alpha27 |
| parseplatform | parse-server | 9.6.0:alpha28 |
| parseplatform | parse-server | 9.6.0:alpha29 |
| parseplatform | parse-server | 9.6.0:alpha3 |
| parseplatform | parse-server | 9.6.0:alpha30 |
| parseplatform | parse-server | 9.6.0:alpha31 |
| parseplatform | parse-server | 9.6.0:alpha32 |
| parseplatform | parse-server | 9.6.0:alpha33 |
| parseplatform | parse-server | 9.6.0:alpha34 |
| parseplatform | parse-server | 9.6.0:alpha35 |
| parseplatform | parse-server | 9.6.0:alpha36 |
| parseplatform | parse-server | 9.6.0:alpha37 |
| parseplatform | parse-server | 9.6.0:alpha38 |
| parseplatform | parse-server | 9.6.0:alpha39 |
| parseplatform | parse-server | 9.6.0:alpha4 |
| parseplatform | parse-server | 9.6.0:alpha40 |
| parseplatform | parse-server | 9.6.0:alpha41 |
| parseplatform | parse-server | 9.6.0:alpha42 |
| parseplatform | parse-server | 9.6.0:alpha5 |
| parseplatform | parse-server | 9.6.0:alpha6 |
| parseplatform | parse-server | 9.6.0:alpha7 |
| parseplatform | parse-server | 9.6.0:alpha8 |
| parseplatform | parse-server | 9.6.0:alpha9 |
𝑥
= Vulnerable software versions
References