Generated remediation guidance and an executive summary. No account required.
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.70 and 9.7.0-alpha.18, an authenticated user with find class-level permission can bypass the protectedFields class-level permission setting on LiveQuery subscriptions. By sending a subscription with a $or, $and, or $nor operator value as a plain object with numeric keys and a length property (an "array-like" object) instead of an array, the protected-field guard is bypassed. The subscription event firing acts as a binary oracle, allowing the attacker to infer whether a protected field matches a given test value. This issue has been patched in versions 8.6.70 and 9.7.0-alpha.18.
Use CWE-843, Parseplatform vendor hub and Parse-Server product page to widen CVE-2026-34595 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-34532, CVE-2026-34784 and CVE-2026-34215 for nearby disclosures in the same product family.