An attacker with master key access can execute arbitrary SQL statements on the PostgreSQL database by injecting SQL metacharacters into field name parameters of the aggregate $group pipeline stage or the distinct operation. This allows privilege escalation from Parse Server application-level administrator to PostgreSQL database-level access.
Only Parse Server deployments using PostgreSQL are affected. MongoDB deployments are not affected.
Field names in the aggregate $group._id object values and distinct dot-notation parameters are now validated to only contain alphanumeric characters and underscores, preventing SQL injection via the :raw interpolation used in the PostgreSQL storage adapter.
No workaround. Upgrade to a patched version.
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-24T19:12:06Z",
"cwe_ids": [
"CWE-89"
],
"nvd_published_at": null,
"severity": "HIGH"
}