CVE-2026-34784
Parse Server: Streaming file download bypasses afterFind file trigger authorization
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.71 and 9.7.1-alpha.1, file downloads via HTTP Range requests bypass the afterFind(Parse.File) trigger and its validators on storage adapters that support streaming (e.g. the default GridFS adapter). This allows access to files that should be protected by afterFind trigger authorization logic or built-in validators such as requireUser. This issue has been patched in versions 8.6.71 and 9.7.1-alpha.1.
| CWE | CWE-285 |
| Vendor | parse-community |
| Product | parse-server |
| Published | Mar 31, 2026 |
| Last Updated | Mar 31, 2026 |
Stay Ahead of the Next One
Get instant alerts for parse-community parse-server
Be the first to know when new unknown vulnerabilities affecting parse-community parse-server are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
parse-community / parse-server
< 8.6.71 >= 9.0.0, < 9.7.1-alpha.1
References
github.com: https://github.com/parse-community/parse-server/security/advisories/GHSA-hpm8-9qx6-jvwv github.com: https://github.com/parse-community/parse-server/pull/10361 github.com: https://github.com/parse-community/parse-server/pull/10362 github.com: https://github.com/parse-community/parse-server/commit/053109b3ee71815bc39ed84116c108ff9edbf337 github.com: https://github.com/parse-community/parse-server/commit/a0b0c69fc44f87f80d793d257344e7dcbf676e22