Parse Server: SQL injection via dot-notation field name in PostgreSQL
Critical severity
GitHub Reviewed
Published
Mar 10, 2026
in
parse-community/parse-server
•
Updated Mar 11, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.2
< 8.6.28
Patched versions
9.6.0-alpha.2
8.6.28
Description
Published to the GitHub Advisory Database
Mar 10, 2026
Reviewed
Mar 10, 2026
Published by the National Vulnerability Database
Mar 11, 2026
Last updated
Mar 11, 2026
Impact
An attacker can use a dot-notation field name in combination with the
sortquery parameter to inject SQL into the PostgreSQL database through an improper escaping of sub-field values in dot-notation queries. The vulnerability may also affect queries that use dot-notation field names with thedistinctandwherequery parameters.This vulnerability only affects deployments using a PostgreSQL database.
Patches
The fix escapes characters in dot-notation sub-field values that could allow a SQL breakout.
Workarounds
There is no known workaround.
References
References