CVE-2026-31800 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: March 11, 2026
Parse Server - Broken Access Control
Published: March 10, 2026Updated: March 11, 2026Remote Exploitable
Overview
Parse Server < 9.5.2-alpha.12 and < 8.6.25 contains a broken access control vulnerability caused by lack of master key authentication on /classes/_GraphQLConfig and /classes/_Audience REST API routes, letting attackers read, modify, and delete GraphQL configuration and push audience data, exploit requires no special privileges.
Severity & Score
Severity: Critical
CVSS Score: 9.1
Impact
Attackers can read, modify, and delete sensitive configuration and audience data, potentially disrupting service and exposing sensitive information.
Mitigation
Update to version 9.5.2-alpha.12 or 8.6.25 or later.
References
Related Resources
Details
- CVE ID
- CVE-2026-31800
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- broken_access_control
- Status
- confirmed
CWE
- CWE-862
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N