Cyber Posture

CVE-2026-30966

Critical

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
EPSS Score 0.0006 19.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30966 is a critical-severity Improper Access Control (CWE-284) vulnerability in Parseplatform Parse-Server. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked at the 19.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Valid Accounts (T1078) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations on API requests to internal relation tables, preventing unauthorized CRUD operations using only the application key.

prevent

Requires timely remediation and patching of the Parse Server flaw exposing internal tables prior to versions 9.5.2-alpha.7 and 8.6.20.

prevent

Limits privileges of application keys to minimal necessary access, mitigating privilege escalation via role injection and CLP bypass.

MITRE ATT&CK Enterprise TechniquesAI

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1548 Abuse Elevation Control Mechanism Privilege Escalation
Adversaries may circumvent mechanisms designed to control privilege elevation to gain higher-level permissions.
Why these techniques?

Improper access control in Parse Server REST/GraphQL API allows unauthenticated attackers with only the app key to directly manipulate internal role-relation tables, enabling account manipulation to join privileged roles and bypass CLP authorization checks (T1078/T1098). This is a direct exploitation of a public-facing application interface (T1190) and abuse of the authorization mechanism (T1548).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed…

more

via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update, or delete records in any internal relationship table. Exploiting this allows the attacker to inject themselves into any Parse Role, gaining all permissions associated with that role, including full read, write, and delete access to classes protected by role-based Class-Level Permissions (CLP). Similarly, writing to any such table that backs a Relation field used in a pointerFields CLP bypasses that access control. This vulnerability is fixed in 9.5.2-alpha.7 and 8.6.20.

Deeper analysisAI

CVE-2026-30966 is an improper access control vulnerability (CWE-284) in Parse Server, an open source backend deployable on any Node.js infrastructure. Versions prior to 9.5.2-alpha.7 and 8.6.20 expose internal tables that store Relation field mappings, such as role memberships, to direct access via the REST API or GraphQL API. This access requires only the application key, with no master key needed, allowing arbitrary creation, reading, updating, or deletion of records in these tables. The issue carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L), indicating critical severity.

Any remote attacker with knowledge of an affected Parse Server's application key can exploit this vulnerability without authentication or user interaction. By manipulating internal relationship tables, the attacker can inject themselves into any Parse Role, thereby inheriting all associated permissions, including full read, write, and delete access to classes protected by role-based Class-Level Permissions (CLP). Additionally, writing to tables backing Relation fields used in pointerFields CLP enables bypass of those access controls, potentially granting comprehensive data manipulation across the application.

The vulnerability is addressed in Parse Server releases 9.5.2-alpha.7 and 8.6.20, as detailed in the corresponding GitHub release notes and security advisory GHSA-5f92-jrq3-28rc. Security practitioners should upgrade to these versions or later to mitigate the issue, ensuring that internal tables are no longer directly accessible without proper authorization.

Details

CWE(s)

Affected Products

parseplatform
parse-server
9.5.2 · ≤ 8.6.20 · 9.0.0 — 9.5.2

CVEs Like This One

CVE-2026-31872Same product: Parseplatform Parse-Server
CVE-2026-33409Same product: Parseplatform Parse-Server
CVE-2026-32248Same product: Parseplatform Parse-Server
CVE-2026-30949Same product: Parseplatform Parse-Server
CVE-2026-27804Same product: Parseplatform Parse-Server
CVE-2026-32242Same product: Parseplatform Parse-Server
CVE-2026-30967Same product: Parseplatform Parse-Server
CVE-2026-32878Same product: Parseplatform Parse-Server
CVE-2026-34532Same product: Parseplatform Parse-Server
CVE-2026-32594Same product: Parseplatform Parse-Server

References