An authenticated user with find class-level permission can bypass the protectedFields class-level permission setting on LiveQuery subscriptions. By sending a subscription with a $or, $and, or $nor operator value as a plain object with numeric keys and a length property (an "array-like" object) instead of an array, the protected-field guard is bypassed. The subscription event firing acts as a binary oracle, allowing the attacker to infer whether a protected field matches a given test value.
The fix validates that $or, $and, and $nor operator values are arrays in the LiveQuery subscription handler, the query depth checker, and the protected-field guard. As defense in depth, the LiveQuery query evaluator also rejects non-array values for these operators.
There is no known workaround.
{
"nvd_published_at": "2026-03-31T16:16:34Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-843"
],
"github_reviewed_at": "2026-04-01T00:07:39Z"
}