Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization
Moderate severity
GitHub Reviewed
Published
Mar 7, 2026
in
parse-community/parse-server
•
Updated Mar 9, 2026
Package
Affected versions
< 8.6.9
>= 9.0.0-alpha.1, < 9.5.0-alpha.9
Patched versions
8.6.9
9.5.0-alpha.9
Description
Published by the National Vulnerability Database
Mar 7, 2026
Published to the GitHub Advisory Database
Mar 9, 2026
Reviewed
Mar 9, 2026
Last updated
Mar 9, 2026
Impact
The file metadata endpoint (GET
/files/:appId/metadata/:filename) does not enforcebeforeFind/afterFindfile triggers. When these triggers are used as access-control gates, the metadata endpoint bypasses them entirely, allowing unauthorized access to file metadata.This affects any deployment that relies on
Parse.Cloud.beforeFind(Parse.File, ...)to restrict file access. Only file metadata (user-defined key-value pairs set via addMetadata) is exposed; file content remains protected.Patches
The metadata handler now runs
beforeFindandafterFindtriggers and returns HTTP 403 when a trigger denies access.Workarounds
Disable the
metadataendpoint by overriding the route with a middleware that rejects all requests:Adjust the path prefix (
/parse) to match your mountPath.References
References