LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-30966

CVE-2026-30966 - Vulnerability Analysis

CriticalCVSS: 10.0

Last Updated: March 11, 2026

Parse Server - Broken Access Control

Published: March 10, 2026Updated: March 11, 2026Remote Exploitable

Overview

Parse Server < 9.5.2-alpha.7 and < 8.6.20 contains a broken access control vulnerability caused by direct access to internal Relation field tables via REST or GraphQL API using only the application key, letting attackers modify role memberships and bypass role-based permissions, exploit requires only application key access.

Severity & Score

Severity: Critical
CVSS Score: 10.0
EPSS Score: 4.3%(Probability of exploitation in next 30 days)

Impact

Attackers can gain full permissions by injecting themselves into roles, allowing full read, write, and delete access to protected data.

Mitigation

Upgrade to version 9.5.2-alpha.7 or 8.6.20 or later.

Social Media Activity(1 post)

Offensive Sequence
Offensive Sequence
@offseq
Mar 11, 2026

🚨 CRITICAL: CVE-2026-30966 in parse-server (<9.5.2-alpha.7, <8.6.20) lets attackers gain any role via REST/GraphQL with just the app key. Upgrade now and restrict API access! Full details: https://radar.offseq.com/threat/cve-2026-30966-cwe-284-improper-access-control-in--321de92a #OffSeq #parseServer #CVE202630966 #infosec

View original post

Details

CVE ID
CVE-2026-30966
Severity
Critical
CVSS Score
10.0
Type
broken_access_control
Status
confirmed
EPSS
4.3%
Social Posts
1

CWE

  • CWE-284

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

EPSS Score

4.3%Probability of exploitation in the next 30 days