Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.40 and 9.6.0-alpha.14, the GraphQL WebSocket endpoint for subscriptions does not pass requests through the Express middleware chain that enforces authentication, introspection control, and query complexity limits. An attacker can connect to the WebSocket endpoint and execute GraphQL operations without providing a valid application or API key, access the GraphQL schema via introspection even when public introspection is disabled, and send arbitrarily complex queries that bypass configured complexity limits. This vulnerability is fixed in 8.6.40 and 9.6.0-alpha.14.
Published: 2026-03-13
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass & Data Exposure
Action: Patch Now
AI Analysis

Impact

Parse Server’s GraphQL WebSocket endpoint bypasses the Express middleware chain that enforces authentication, introspection control, and query complexity limits in versions prior to 8.6.40 and 9.6.0-alpha.14. An attacker can connect to the WebSocket endpoint without providing a valid application or API key, thereby executing arbitrary GraphQL operations, retrieving the full schema via introspection even when public introspection is disabled, and sending extremely complex queries that bypass configured complexity limits. This vulnerability is a Classic Authentication Bypass (CWE-306) that can lead to unauthorized data disclosure and potential denial‑of‑service conditions by exhausting server resources.

Affected Systems

The affected product is the open‑source Parse Server (parse-community:parse-server) for any Node.js‑capable environment. Vulnerable releases are those before 8.6.40 and before 9.6.0-alpha.14, including all 9.6.0-alpha.1 through alpha.13 releases. The issued CPE list shows all 9.6.0-alpha.1–alpha13 plus earlier alpha releases.

Risk and Exploitability

The CVSS score is 6.9, indicating moderate severity, and the EPSS probability is less than 1 %. The vulnerability is not listed in the CISA KEV catalog. It can be exploited remotely by connecting to the WebSocket endpoint over the network, without the need for local privileges or valid credentials, thereby enabling the attacker to bypass authentication and other controls.

Generated by OpenCVE AI on March 17, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Parse Server to v8.6.40 or v9.6.0-alpha.14 or later to apply the mitigation.
  • If a patch cannot be applied immediately, restrict network access to the WebSocket endpoint by firewall rules or IP whitelisting.
  • Disable public GraphQL introspection if possible and monitor for anomalous WebSocket activity.
  • Verify that Express middleware is enabled for all GraphQL routes to enforce authentication and complexity limits.

Generated by OpenCVE AI on March 17, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p2x3-8689-cwpg Parse Server's GraphQL WebSocket endpoint bypasses security middleware
History

Tue, 17 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Parseplatform
Parseplatform parse-server
CPEs cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha10:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha11:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha12:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha13:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha8:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha9:*:*:*:node.js:*:*
Vendors & Products Parseplatform
Parseplatform parse-server
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Parse Community
Parse Community parse Server
Vendors & Products Parse Community
Parse Community parse Server

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.40 and 9.6.0-alpha.14, the GraphQL WebSocket endpoint for subscriptions does not pass requests through the Express middleware chain that enforces authentication, introspection control, and query complexity limits. An attacker can connect to the WebSocket endpoint and execute GraphQL operations without providing a valid application or API key, access the GraphQL schema via introspection even when public introspection is disabled, and send arbitrarily complex queries that bypass configured complexity limits. This vulnerability is fixed in 8.6.40 and 9.6.0-alpha.14.
Title Parse Server GraphQL WebSocket endpoint bypasses security middleware
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Parse Community Parse Server
Parseplatform Parse-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T13:57:44.809Z

Reserved: 2026-03-12T14:54:24.268Z

Link: CVE-2026-32594

cve-icon Vulnrichment

Updated: 2026-03-16T13:57:37.229Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:38.667

Modified: 2026-03-17T18:06:40.090

Link: CVE-2026-32594

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:40:02Z

Weaknesses