TROYANOSYVIRUS
Back to CVEs

CVE-2026-30965

CRITICAL
9.1

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.8 and 8.6.21, a vulnerability in Parse Server's query handling allows an authenticated or unauthenticated attacker to exfiltrate session tokens of other users by exploiting the redirectClassNameForKey query parameter. Exfiltrated session tokens can be used to take over user accounts. The vulnerability requires the attacker to be able to create or update an object with a new relation field, which depends on the Class-Level Permissions of at least one class. This vulnerability is fixed in 9.5.2-alpha.8 and 8.6.21.

CVE Details

CVSS v3.1 Score9.1
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/10/2026
Last Modified3/11/2026
Sourcenvd
Honeypot Sightings0

Affected Products

parseplatform:parse-server

Weaknesses (CWE)

CWE-863

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.