CVE-2026-32248: Account Takeover via Operator Injection in Parse Server
Vulnerability ID: CVE-2026-32248
CVSS Score: 9.3
Published: 2026-03-12
Parse Server versions prior to 8.6.38 and 9.6.0-alpha.12 are vulnerable to a critical account takeover vulnerability due to improper input validation in the authentication logic. Unauthenticated remote attackers can bypass authentication and obtain valid session tokens by injecting database operators into the anonymous authentication provider's identifier payload.
TL;DR
Unauthenticated attackers can achieve full account takeover in Parse Server by injecting MongoDB or PostgreSQL query operators into the anonymous authentication identifier, forcing the backend to return a valid session token for existing users.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-943
- Attack Vector: Network
- CVSS Score: 9.3
- Impact: Account Takeover
- Exploit Status: POC Available
- CISA KEV: Not Listed
Affected Systems
- Parse Server deployments using MongoDB
- Parse Server deployments using PostgreSQL
- Node.js backend applications importing the parse-server module
-
Parse Server: < 8.6.38 (Fixed in:
8.6.38) -
Parse Server: >= 9.0.0, < 9.6.0-alpha.12 (Fixed in:
9.6.0-alpha.12)
Code Analysis
Commit: 93425df
fix: Account takeover via operator injection in authentication data identifier
Exploit Details
- GitHub Security Advisory: Proof of concept demonstrating account takeover via operator injection
Mitigation Strategies
- Upgrade Parse Server to fixed versions 8.6.38 or 9.6.0-alpha.12
- Disable the anonymous authentication provider via Parse Server configuration if unused
- Implement Web Application Firewall (WAF) rules to detect and block NoSQL operators in authentication payloads
Remediation Steps:
- Identify the currently deployed version of Parse Server
- Update the project package.json to require version 8.6.38 or 9.6.0-alpha.12
- Rebuild and redeploy the Node.js application
- Alternatively, set
auth: { anonymous: false }in the ParseServer instantiation options
References
Read the full report for CVE-2026-32248 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)