Cyber Posture

CVE-2026-31856

Critical

Published: 11 March 2026

Published
11 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 12.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31856 is a critical-severity SQL Injection (CWE-89) vulnerability in Parseplatform Parse-Server. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the increment amount input to prevent direct SQL interpolation and injection of arbitrary subqueries in PostgreSQL queries.

prevent

Directly mitigates the vulnerability by requiring timely installation of patches for Parse Server versions 9.6.0-alpha.3 or 8.6.29 that fix the SQL injection flaw.

preventdetect

Scans for SQL injection vulnerabilities like CVE-2026-31856 in Parse Server and remediates them within defined timeframes.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public Parse Server REST API (PostgreSQL adapter) directly enables remote exploitation of a public-facing application (T1190) and arbitrary database data access bypassing ACLs/CLPs (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A SQL injection vulnerability exists in the PostgreSQL storage adapter when processing Increment operations on nested object fields using dot notation (e.g.,…

more

stats.counter). The amount value is interpolated directly into the SQL query without parameterization or type validation. An attacker who can send write requests to the Parse Server REST API can inject arbitrary SQL subqueries to read any data from the database, bypassing CLPs and ACLs. MongoDB deployments are not affected. This vulnerability is fixed in 9.6.0-alpha.3 and 8.6.29.

Deeper analysisAI

CVE-2026-31856 is a SQL injection vulnerability in Parse Server, an open source backend deployable on any Node.js-compatible infrastructure. The issue affects the PostgreSQL storage adapter specifically during Increment operations on nested object fields using dot notation, such as "stats.counter." In these cases, the amount value is directly interpolated into the SQL query without parameterization or type validation, enabling injection of arbitrary SQL subqueries. MongoDB deployments are unaffected. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-89.

An unauthenticated attacker with the ability to send write requests to the Parse Server REST API can exploit this flaw. By crafting a malicious Increment request, the attacker can inject SQL subqueries that allow reading arbitrary data from the PostgreSQL database, circumventing Class-Level Permissions (CLPs) and Access Control Lists (ACLs). This grants high confidentiality, integrity, and availability impacts remotely with low complexity.

Parse Server has addressed the vulnerability in versions 9.6.0-alpha.3 and 8.6.29, as detailed in the project's GitHub security advisory (GHSA-q3vj-96h2-gwvg) and corresponding release notes. Security practitioners should upgrade to these patched versions to mitigate the risk.

Details

CWE(s)

Affected Products

parseplatform
parse-server
9.6.0 · ≤ 8.6.29 · 9.0.0 — 9.6.0

CVEs Like This One

CVE-2026-31840Same product: Parseplatform Parse-Server
CVE-2026-31871Same product: Parseplatform Parse-Server
CVE-2026-33539Same product: Parseplatform Parse-Server
CVE-2026-30941Same product: Parseplatform Parse-Server
CVE-2026-32594Same product: Parseplatform Parse-Server
CVE-2026-31800Same product: Parseplatform Parse-Server
CVE-2026-32098Same product: Parseplatform Parse-Server
CVE-2026-30947Same product: Parseplatform Parse-Server
CVE-2026-30967Same product: Parseplatform Parse-Server
CVE-2026-34532Same product: Parseplatform Parse-Server

References