Node.js RCE (CVE-2026-30966)
CVE-2026-30966
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field ma...
Overview
A critical security vulnerability has been identified in Parse Server, an open-source backend framework. This flaw allows any user with a standard application key to directly manipulate the server’s internal relationship tables, leading to a complete bypass of role-based access controls.
Vulnerability Details
In affected versions, the internal tables that manage relationships-such as which users belong to which roles-were incorrectly exposed through the public REST and GraphQL APIs. Crucially, exploitation does not require the privileged master key; only the general application key is needed. An attacker can perform create, read, update, and delete (CRUD) operations on these tables.
The core issue is an access control failure. By modifying these tables, an attacker can add themselves to any existing Parse Role. Roles are central to Parse Server’s security model, as Class-Level Permissions (CLPs) often restrict data access based on them.
Impact
The impact of this vulnerability is severe. A successful attacker gains all permissions associated with the compromised role. This typically results in:
- Full data compromise: Read, modify, and delete all data in database classes protected by role-based CLPs.
- Privilege escalation: An ordinary user can elevate themselves to an administrative or highly privileged role.
- Bypassed security policies: Pointer-based CLPs that rely on Relation fields are also circumvented.
This flaw provides a direct path to a full application breach, potentially exposing sensitive user data and allowing widespread data destruction. For context on the risks of such breaches, recent incidents are detailed in our breach reports.
Remediation and Mitigation
Immediate action is required to secure affected deployments.
Primary Fix: Patch Immediately The vulnerability is fixed in Parse Server versions 9.5.2-alpha.7 and 8.6.20. All users must upgrade to one of these patched versions immediately. Review the official Parse Server release notes for upgrade instructions.
Temporary Mitigation (If Patching is Delayed) If immediate patching is not possible, consider the following temporary measures while you schedule the upgrade:
- Audit Logs: Closely monitor API access logs for unexpected queries or mutations targeting internal tables (e.g.,
_Join:roles:_User). - Network Controls: Restrict direct access to your Parse Server API endpoints where feasible.
Staying informed on such critical updates is a key part of infrastructure management. For the latest on vulnerabilities and patches, follow our security news section.
Important Note: There is no workaround that fully mitigates this vulnerability without applying the official patch. Upgrading is the only complete solution.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-30966?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and...
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the reque...
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...
Other Node.js Vulnerabilities
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and...
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the reque...
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...