CVE-2026-30850: Missing Authorization in Parse Server File Metadata Endpoint
Vulnerability ID: CVE-2026-30850
CVSS Score: 6.3
Published: 2026-03-09
Parse Server versions prior to 8.6.9 and 9.5.0-alpha.9 contain a missing authorization vulnerability (CWE-862) in the file metadata retrieval endpoint. The application fails to invoke developer-defined beforeFind and afterFind security triggers when processing requests for file metadata. This flaw allows attackers to bypass access controls and extract sensitive file metadata, provided they know the target filename.
TL;DR
An authorization bypass in Parse Server's metadata endpoint allows unauthorized access to file metadata by skipping security triggers. Upgrading to version 8.6.9 or 9.5.0-alpha.9 resolves the issue.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-862
- Attack Vector: Network
- CVSS 4.0 Score: 6.3 (Medium)
- EPSS Score: 0.00049 (14.84%)
- Impact: Unauthorized Metadata Exposure
- Exploit Status: PoC Available
- CISA KEV: Not Listed
Affected Systems
- Parse Server (Node.js backend)
-
parse-server: < 8.6.9 (Fixed in:
8.6.9) -
parse-server: 9.0.0-alpha.1 to < 9.5.0-alpha.9 (Fixed in:
9.5.0-alpha.9)
Code Analysis
Commit: 10106
Fix for file metadata trigger bypass in FilesRouter
const file = new Parse.File(filename, { base64: '' }); await triggers.maybeRunFileTrigger(triggers.Types.beforeFind, { file }, config, req.auth); const data = await filesController.getMetadata(filename); await triggers.maybeRunFileTrigger(triggers.Types.afterFind, { file }, config, req.auth);
Mitigation Strategies
- Upgrade Parse Server to version 8.6.9 or 9.5.0-alpha.9
- Implement Express middleware to block GET requests to the metadata endpoint
Remediation Steps:
- Identify the current version of Parse Server running in the environment.
- Update the
parse-serverpackage via npm/yarn to version 8.6.9 or higher. - If upgrading is not possible, add a blocking middleware for
/parse/files/:appId/metadata/:filenamereturning a 403 status. - Verify that file uploads, downloads, and other standard file operations continue to function normally.
- Run the application test suite to ensure custom file triggers execute correctly.
References
- GitHub Security Advisory GHSA-hwx8-q9cg-mqmc
- Fix Commit (PR #10106)
- Release 8.6.9
- Release 9.5.0-alpha.9
- NVD Entry for CVE-2026-30850
Read the full report for CVE-2026-30850 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)