Cyber Posture

CVE-2026-30229

High

Published: 06 March 2026

Published
06 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30229 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Parseplatform Parse-Server. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Authorization bypass in public-facing Parse Server API allows readOnlyMasterKey holder to escalate privileges and impersonate any valid user via crafted /loginAs request, directly mapping to exploitation for privilege escalation and abuse of valid accounts.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.6 and 9.5.0-alpha.4, the readOnlyMasterKey can call POST /loginAs to obtain a valid session token for any user. This…

more

allows a read-only credential to impersonate arbitrary users with full read and write access to their data. Any Parse Server deployment that uses readOnlyMasterKey is affected. This issue has been patched in versions 8.6.6 and 9.5.0-alpha.4.

Deeper analysisAI

CVE-2026-30229 is a high-severity authorization vulnerability (CWE-863) in Parse Server, an open-source backend platform deployable on any Node.js-compatible infrastructure. In versions prior to 8.6.6 and 9.5.0-alpha.4, the readOnlyMasterKey credential can invoke the POST /loginAs endpoint to generate a valid session token for any user account. This flaw enables a read-only master key to bypass intended restrictions and escalate to full user privileges, compromising confidentiality, integrity, and availability with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). Deployments explicitly using readOnlyMasterKey are vulnerable.

An attacker with access to a readOnlyMasterKey—typically a privileged administrative credential—can exploit this remotely over the network with low complexity and no user interaction. By sending a crafted POST request to /loginAs, they obtain a session token impersonating any target user, granting full read and write access to that user's data across the Parse Server instance. This could lead to data exfiltration, modification, or deletion, depending on the application's data model and user permissions.

The Parse community addressed this in Parse Server versions 8.6.6 and 9.5.0-alpha.4, as detailed in the official release notes and security advisory (GHSA-79wj-8rqv-jvp5). Security practitioners should upgrade immediately if using affected versions and review configurations to ensure readOnlyMasterKey is not exposed or misused, disabling it where possible in favor of more granular permissions.

Details

CWE(s)

Affected Products

parseplatform
parse-server
9.5.0 · ≤ 8.6.6 · 9.0.0 — 9.4.1

CVEs Like This One

CVE-2026-29182Same product: Parseplatform Parse-Server
CVE-2026-34532Same product: Parseplatform Parse-Server
CVE-2026-30965Same product: Parseplatform Parse-Server
CVE-2026-30947Same product: Parseplatform Parse-Server
CVE-2026-30863Same product: Parseplatform Parse-Server
CVE-2026-31828Same product: Parseplatform Parse-Server
CVE-2026-33409Same product: Parseplatform Parse-Server
CVE-2026-27804Same product: Parseplatform Parse-Server
CVE-2026-32242Same product: Parseplatform Parse-Server
CVE-2026-32248Same product: Parseplatform Parse-Server

References