Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
Parse Server: Leaks Database Error Details in API Response
CVE-2026-30835
GHSA-9cp7-3q5w-j92g
GHSA-9cp7-3q5w-j92g
Summary
A security issue in Parse Server can leak sensitive database information to any client that sends a malformed query. This can happen if you're using an outdated version of Parse Server. To fix this, you need to update to version 9.5.0-alpha.6 or 8.6.7.
What to do
- Update parseadmin parse-server to version 9.5.0-alpha.6.
- Update parseadmin parse-server to version 8.6.7.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| parseadmin | parse-server | > 9.0.0 , <= 9.5.0-alpha.6 | 9.5.0-alpha.6 |
| parseadmin | parse-server | <= 8.6.7 | 8.6.7 |
Original title
parse-server: Malformed `$regex` query leaks database error details in API response
Original description
### Impact
A malformed $regex query parameter (e.g. `[abc)` causes the database to return a structured error object that is passed unsanitized through the API response. This leaks database internals such as error messages, error codes, code names, cluster timestamps, and topology details. The vulnerability is exploitable by any client that can send query requests, depending on the deployment's permission configuration.
### Patches
The fix sanitizes database error objects so that only a generic `"An internal server error occurred"` message is returned to clients, while the detailed error is logged server-side. The fix respects the `enableSanitizedErrorResponse` server option.
### Workarounds
There is no workaround other than upgrading. The error leakage occurs in the query execution layer and cannot be mitigated through server configuration or client-side changes.
### Resources
- GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-9cp7-3q5w-j92g
- Fix in Parse Server 9: https://github.com/parse-community/parse-server/releases/tag/9.5.0-alpha.6
- Fix in Parse Server 8: https://github.com/parse-community/parse-server/releases/tag/8.6.7
A malformed $regex query parameter (e.g. `[abc)` causes the database to return a structured error object that is passed unsanitized through the API response. This leaks database internals such as error messages, error codes, code names, cluster timestamps, and topology details. The vulnerability is exploitable by any client that can send query requests, depending on the deployment's permission configuration.
### Patches
The fix sanitizes database error objects so that only a generic `"An internal server error occurred"` message is returned to clients, while the detailed error is logged server-side. The fix respects the `enableSanitizedErrorResponse` server option.
### Workarounds
There is no workaround other than upgrading. The error leakage occurs in the query execution layer and cannot be mitigated through server configuration or client-side changes.
### Resources
- GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-9cp7-3q5w-j92g
- Fix in Parse Server 9: https://github.com/parse-community/parse-server/releases/tag/9.5.0-alpha.6
- Fix in Parse Server 8: https://github.com/parse-community/parse-server/releases/tag/8.6.7
nvd CVSS4.0
6.9
Vulnerability type
CWE-209
- https://github.com/parse-community/parse-server/releases/tag/8.6.7
- https://github.com/parse-community/parse-server/releases/tag/9.5.0-alpha.6
- https://github.com/parse-community/parse-server/security/advisories/GHSA-9cp7-3q...
- https://github.com/advisories/GHSA-9cp7-3q5w-j92g
- https://nvd.nist.gov/vuln/detail/CVE-2026-30835
- https://github.com/parse-community/parse-server Product
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026