CVE-2026-30966
中文标题:
(暂无数据)
英文标题:
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.
漏洞描述
中文描述:
(暂无数据)
英文描述:
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update, or delete records in any internal relationship table. Exploiting this allows the attacker to inject themselves into any Parse Role, gaining all permissions associated with that role, including full read, write, and delete access to classes protected by role-based Class-Level Permissions (CLP). Similarly, writing to any such table that backs a Relation field used in a pointerFields CLP bypasses that access control. This vulnerability is fixed in 9.5.2-alpha.7 and 8.6.20.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| parseplatform | parse-server | * | - | - |
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
|
| parseplatform | parse-server | 9.5.2 | - | - |
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha1:*:*:*:node.js:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| NVD | nvd_CVE-2026-30966 |
2026-03-11 02:00:06 | 2026-03-10 22:00:03 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 0 -> 2