Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30972: CWE-799: Improper Control of Interaction Frequency in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-30972cvecve-2026-30972cwe-799
Published: Tue Mar 10 2026 (03/10/2026, 20:48:47 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior o 9.5.2-alpha.10 and 8.6.23, Parse Server's rate limiting middleware is applied at the Express middleware layer, but the batch request endpoint (/batch) processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware including rate limiting. An attacker can bundle multiple requests targeting a rate-limited endpoint into a single batch request to circumvent the configured rate limit. Any Parse Server deployment that relies on the built-in rate limiting feature is affected. This vulnerability is fixed in 9.5.2-alpha.10 and 8.6.23.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:15:47 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js and provides REST API endpoints, including a batch request endpoint (/batch) that allows clients to send multiple sub-requests in a single HTTP request. The vulnerability CVE-2026-30972 stems from improper control of interaction frequency (CWE-799) due to the rate limiting middleware being applied only at the Express middleware layer. While individual requests are subject to rate limiting, the batch endpoint processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware and thus the rate limiting controls. This architectural design flaw enables an attacker to bundle numerous requests targeting rate-limited endpoints into a single batch request, effectively circumventing the configured rate limits. This can lead to excessive resource consumption, potential denial of service, or abuse of backend services. The vulnerability affects parse-server versions >= 9.0.0 and < 9.5.2-alpha.10, and all versions prior to 8.6.23. The issue was addressed by applying rate limiting controls properly to the batch sub-requests in versions 9.5.2-alpha.10 and 8.6.23. Exploitation requires no authentication or user interaction, and the attack vector is network-based. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and potential impact on availability and resource integrity.

Potential Impact

The primary impact of this vulnerability is the ability for attackers to bypass rate limiting controls, which can lead to resource exhaustion on the parse-server backend. This can degrade service availability, cause denial of service conditions, and potentially enable further attacks that rely on overwhelming the backend infrastructure. Organizations relying on parse-server's built-in rate limiting for abuse prevention or API usage control are at risk of having these protections nullified. This can affect cloud services, mobile backends, and web applications using parse-server, potentially leading to service disruptions and increased operational costs due to resource overuse. Since no authentication is required, the attack surface is broad, and attackers can exploit this vulnerability remotely. Although no known exploits are reported in the wild yet, the straightforward bypass mechanism makes it a significant risk if unpatched. The vulnerability does not directly expose sensitive data but undermines service integrity and availability.

Mitigation Recommendations

The most effective mitigation is to upgrade parse-server to version 9.5.2-alpha.10 or later, or 8.6.23 or later, where the batch request endpoint properly enforces rate limiting on sub-requests. Until upgrades can be applied, organizations should consider implementing external rate limiting or API gateway controls that inspect and limit batch requests as a whole and their sub-requests. Monitoring and alerting on unusual batch request volumes or patterns can help detect exploitation attempts. Additionally, restricting access to the batch endpoint to trusted clients or requiring authentication can reduce exposure. Reviewing and tightening resource quotas and backend service limits can mitigate the impact of potential abuse. Network-level protections such as WAF rules to detect and throttle suspicious batch request payloads may also be beneficial. Finally, educating developers and administrators about this vulnerability and ensuring timely patch management is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:53:48.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b0864c2f860ef943bbb070

Added to database: 3/10/2026, 8:59:56 PM

Last enriched: 3/10/2026, 9:15:47 PM

Last updated: 3/13/2026, 12:42:22 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses