Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.7 and 9.5.0-alpha.6, malformed $regex query parameter (e.g. [abc) causes the database to return a structured error object that is passed unsanitized through the API response. This leaks database internals such as error messages, error codes, code names, cluster timestamps, and topology details. The vulnerability is exploitable by any client that can send query requests, depending on the deployment's permission configuration. This issue has been patched in versions 8.6.7 and 9.5.0-alpha.6.
References
| Link | Resource |
|---|---|
| https://github.com/parse-community/parse-server/releases/tag/8.6.7 | Product Release Notes |
| https://github.com/parse-community/parse-server/releases/tag/9.5.0-alpha.6 | Product Release Notes |
| https://github.com/parse-community/parse-server/security/advisories/GHSA-9cp7-3q5w-j92g | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-06 21:16
Updated : 2026-03-11 13:08
NVD link : CVE-2026-30835
Mitre link : CVE-2026-30835
CVE.ORG link : CVE-2026-30835
JSON object : View
Products Affected
parseplatform
- parse-server
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
