← Volver a CVEs
CVE-2026-30835
MEDIUM5.3
Descripcion
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.7 and 9.5.0-alpha.6, malformed $regex query parameter (e.g. [abc) causes the database to return a structured error object that is passed unsanitized through the API response. This leaks database internals such as error messages, error codes, code names, cluster timestamps, and topology details. The vulnerability is exploitable by any client that can send query requests, depending on the deployment's permission configuration. This issue has been patched in versions 8.6.7 and 9.5.0-alpha.6.
Detalles CVE
Puntuacion CVSS v3.15.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/6/2026
Ultima modificacion3/11/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
parseplatform:parse-server
Debilidades (CWE)
CWE-209
Referencias
https://github.com/parse-community/parse-server/releases/tag/8.6.7(security-advisories@github.com)
https://github.com/parse-community/parse-server/releases/tag/9.5.0-alpha.6(security-advisories@github.com)
https://github.com/parse-community/parse-server/security/advisories/GHSA-9cp7-3q5w-j92g(security-advisories@github.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.