Parse Server has SQL Injection through aggregate and distinct field names in PostgreSQL adapter
High severity
GitHub Reviewed
Published
Mar 21, 2026
in
parse-community/parse-server
•
Updated Mar 24, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.53
< 8.6.59
Patched versions
9.6.0-alpha.53
8.6.59
Description
Published to the GitHub Advisory Database
Mar 24, 2026
Reviewed
Mar 24, 2026
Last updated
Mar 24, 2026
Impact
An attacker with master key access can execute arbitrary SQL statements on the PostgreSQL database by injecting SQL metacharacters into field name parameters of the aggregate
$grouppipeline stage or thedistinctoperation. This allows privilege escalation from Parse Server application-level administrator to PostgreSQL database-level access.Only Parse Server deployments using PostgreSQL are affected. MongoDB deployments are not affected.
Patches
Field names in the aggregate
$group._idobject values anddistinctdot-notation parameters are now validated to only contain alphanumeric characters and underscores, preventing SQL injection via the:rawinterpolation used in the PostgreSQL storage adapter.Workarounds
No workaround. Upgrade to a patched version.
References