CVE-2026-32594
Awaiting Analysis Awaiting Analysis - Queue
Authentication Bypass in Parse Server GraphQL WebSocket Endpoint

Publication date: 2026-03-16

Last updated on: 2026-03-17

Assigner: GitHub, Inc.

Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.40 and 9.6.0-alpha.14, the GraphQL WebSocket endpoint for subscriptions does not pass requests through the Express middleware chain that enforces authentication, introspection control, and query complexity limits. An attacker can connect to the WebSocket endpoint and execute GraphQL operations without providing a valid application or API key, access the GraphQL schema via introspection even when public introspection is disabled, and send arbitrarily complex queries that bypass configured complexity limits. This vulnerability is fixed in 8.6.40 and 9.6.0-alpha.14.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-16
Last Modified
2026-03-17
Generated
2026-05-07
AI Q&A
2026-03-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server From 9.0.0 (inc) to 9.6.0 (exc)
parseplatform parse-server to 8.6.40 (exc)
parseplatform parse-server 9.6.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-32594 is a security vulnerability in Parse Server's GraphQL WebSocket endpoint used for subscriptions. This endpoint bypassed the Express middleware chain that normally enforces authentication, introspection control, and query complexity limits. As a result, an attacker could connect to this WebSocket endpoint without providing valid application or API keys, access the GraphQL schema even when introspection was disabled, and send arbitrarily complex queries that bypass configured limits."}, {'type': 'paragraph', 'content': 'The root cause was that the WebSocket subscription feature was incomplete and did not enforce the necessary security middleware. The vulnerability was fixed by removing the WebSocket subscription support entirely, including the removal of the `subscriptions-transport-ws` package and related code, ensuring all GraphQL operations are subject to proper authentication and authorization checks.'}] [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability allows an attacker to bypass authentication and authorization controls by connecting to the GraphQL WebSocket endpoint without valid credentials. This can lead to unauthorized execution of GraphQL operations, exposure of the GraphQL schema through introspection even when it is supposed to be disabled, and the ability to send complex queries that exceed configured limits.

Such unauthorized access can result in information disclosure, potential resource exhaustion due to complex queries, and overall compromise of the security posture of the backend system running Parse Server.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves the GraphQL WebSocket endpoint at the path `/subscriptions` bypassing security middleware, allowing unauthorized access. Detection can focus on monitoring or blocking WebSocket upgrade requests to this endpoint.'}, {'type': 'paragraph', 'content': 'A practical detection method is to check for active WebSocket connections or upgrade requests targeting the `/subscriptions` path on your Parse Server instance.'}, {'type': 'list_item', 'content': 'Use network monitoring tools like tcpdump or Wireshark to filter WebSocket upgrade requests to the `/subscriptions` endpoint.'}, {'type': 'list_item', 'content': 'Example tcpdump command to capture WebSocket upgrade requests on port 80 or 443 (adjust port as needed):'}, {'type': 'list_item', 'content': "tcpdump -i any -A 'tcp port 80 or tcp port 443' | grep -i 'GET /subscriptions HTTP/1.1'"}, {'type': 'list_item', 'content': 'Check server logs for incoming WebSocket upgrade requests to `/subscriptions` that do not require authentication.'}, {'type': 'list_item', 'content': 'If using a reverse proxy (e.g., Nginx), enable access logging and filter for requests to `/subscriptions` with `Upgrade: websocket` headers.'}, {'type': 'paragraph', 'content': 'Since the vulnerability allows bypassing authentication, any unauthorized WebSocket connection to `/subscriptions` indicates exposure.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade Parse Server to a patched version where the vulnerability is fixed: version 8.6.40 or 9.6.0-alpha.14 or later.

If immediate upgrade is not possible, a recommended workaround is to block WebSocket upgrade requests to the `/subscriptions` endpoint at the network level.

  • Configure your reverse proxy or firewall to deny or drop WebSocket upgrade requests targeting `/subscriptions`.
  • Remove or disable the GraphQL WebSocket subscription feature in your Parse Server configuration if feasible.

These steps prevent attackers from exploiting the bypass by disallowing unauthorized WebSocket connections that circumvent middleware authentication.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart