LiveQuery protected field leak via shared mutable state across concurrent subscribers
High severity
GitHub Reviewed
Published
Mar 27, 2026
in
parse-community/parse-server
•
Updated Mar 31, 2026
Package
Affected versions
>= 9.0.0, < 9.7.0-alpha.9
< 8.6.65
Patched versions
9.7.0-alpha.9
8.6.65
Description
Published to the GitHub Advisory Database
Mar 30, 2026
Reviewed
Mar 30, 2026
Published by the National Vulnerability Database
Mar 31, 2026
Last updated
Mar 31, 2026
Impact
When multiple clients subscribe to the same class via LiveQuery, the event handlers process each subscriber concurrently using shared mutable objects. The sensitive data filter modifies these shared objects in-place, so when one subscriber's filter removes a protected field, subsequent subscribers may receive the already-filtered object. This can cause protected fields and authentication data to leak to clients that should not see them, or cause clients that should see the data to receive an incomplete object.
Additionally, when an afterEvent Cloud Code trigger is registered, one subscriber's trigger modifications can leak to other subscribers through the same shared mutable state.
Any Parse Server deployment using LiveQuery with protected fields or afterEvent triggers is affected when multiple clients subscribe to the same class.
Patches
The fix deep-clones the shared objects at the start of each subscriber's processing callback, ensuring each subscriber works on an independent copy. Additionally, a bug was fixed where master key LiveQuery clients could not receive events on classes with protected fields due to an incorrect type passed to the sensitive data filter.
Workarounds
There is no known workaround.
Resources
References