CVE-2026-34784
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.71 and 9.7.1-alpha.1, file downloads via HTTP Range requests bypass the afterFind(Parse.File) trigger and its validators on storage adapters that support streaming (e.g. the default GridFS adapter). This allows access to files that should be protected by afterFind trigger authorization logic or built-in validators such as requireUser. This issue has been patched in versions 8.6.71 and 9.7.1-alpha.1.
Vendor
Product
CWE
Yayın Tarihi
2026-03-31 20:16:29
Güncelleme
2026-04-01 17:06:54
Source Identifier
security-advisories@github.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/parse-community/parse-server/commit/053109b3ee71815bc39ed84116c108ff9edbf337
https://github.com/parse-community/parse-server/commit/a0b0c69fc44f87f80d793d257344e7dcbf676e22
https://github.com/parse-community/parse-server/pull/10361
https://github.com/parse-community/parse-server/pull/10362
https://github.com/parse-community/parse-server/security/advisories/GHSA-hpm8-9qx6-jvwv