Impact
The vulnerability in Parse Server allows an attacker to receive protected fields and authData for any user who has permission to subscribe to a class that has a `Parse.Cloud.afterLiveQueryEvent` trigger registered. Because the LiveQuery server creates an unfiltered JSON copy of the event object before applying the protected‑fields filter, payloads sent to subscribers contain sensitive personal information and OAuth tokens. This results in a confidentiality breach consistent with CWE‑200, where protected data is unintentionally disclosed to unauthorized parties.
Affected Systems
Affecting parse-community:parse-server versions prior to 9.6.0‑alpha.35 and 8.6.50. All alpha releases from 9.6.0‑alpha.1 through 9.6.0‑alpha.34 are impacted, as indicated by the CPE entries. Environments running these versions and executing a `Parse.Cloud.afterLiveQueryEvent` trigger for any class exposed to LiveQuery subscriptions are at risk.
Risk and Exploitability
The CVSS score of 8.2 classifies this as a high‑severity vulnerability. EPSS is reported as less than 1 %, suggesting a low likelihood of exploitation, and it is not listed in the CISA KEV catalog. Exploitation requires that an attacker can subscribe to the affected class and that a live‑query after‑event trigger is registered; no other special prerequisites are specified. The vulnerability exploits a reference detachment bug that leads to data leakage via the unfiltered JSON copy returned to clients.
OpenCVE Enrichment
Github GHSA