LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31800

CVE-2026-31800 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: March 11, 2026

Parse Server - Broken Access Control

Published: March 10, 2026Updated: March 11, 2026Remote Exploitable

Overview

Parse Server < 9.5.2-alpha.12 and < 8.6.25 contains a broken access control vulnerability caused by lack of master key authentication on /classes/_GraphQLConfig and /classes/_Audience REST API routes, letting attackers read, modify, and delete GraphQL configuration and push audience data, exploit requires no special privileges.

Severity & Score

Severity: Critical
CVSS Score: 9.1

Impact

Attackers can read, modify, and delete sensitive configuration and audience data, potentially disrupting service and exposing sensitive information.

Mitigation

Update to version 9.5.2-alpha.12 or 8.6.25 or later.

Details

CVE ID
CVE-2026-31800
Severity
Critical
CVSS Score
9.1
Type
broken_access_control
Status
confirmed

CWE

  • CWE-862

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N