Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32770: CWE-248: Uncaught Exception in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-32770cvecve-2026-32770cwe-248
Published: Wed Mar 18 2026 (03/18/2026, 21:37:36 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-32770 is a medium severity vulnerability in parse-community's parse-server that allows a remote attacker to cause a denial of service by crashing the server. The issue arises when an attacker subscribes to a LiveQuery using an invalid regular expression pattern, which triggers an uncaught exception in the regex engine and terminates the server process. This affects parse-server versions >= 9. 0. 0 and < 9. 6. 0-alpha. 19, and versions below 8. 6. 43.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:16:43 UTC

Technical Analysis

Parse Server is an open-source backend platform that supports LiveQuery subscriptions, enabling real-time data updates to clients. In affected versions prior to 9.6.0-alpha.19 and 8.6.43, the server does not properly validate regular expression patterns supplied during LiveQuery subscriptions. When a remote attacker submits an invalid regex pattern, the regex engine throws an uncaught exception during subscription matching. This exception is not handled, causing the entire Node.js server process to terminate unexpectedly. Consequently, all connected clients lose service, resulting in a denial of service (DoS) condition. The vulnerability is categorized under CWE-248 (Uncaught Exception). The patch introduced in versions 9.6.0-alpha.19 and 8.6.43 adds validation to reject invalid regex patterns at the time of subscription and implements a defense-in-depth try-catch mechanism to prevent any regex matching errors from crashing the server. The vulnerability requires no authentication or user interaction and can be triggered remotely over the network. The CVSS v3.1 base score is 5.9, reflecting medium severity due to the impact on availability and the complexity of exploitation being moderate (high attack complexity). No known exploits have been reported in the wild to date.

Potential Impact

This vulnerability primarily impacts the availability of parse-server instances running vulnerable versions with LiveQuery enabled. An attacker can remotely crash the server by sending a malformed regex pattern, causing a denial of service for all connected clients. Organizations relying on parse-server for real-time backend services may experience service outages, disrupting applications dependent on live data updates. This can lead to degraded user experience, potential loss of revenue, and operational disruptions. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modifications are not a direct concern. However, repeated or sustained exploitation could lead to reputational damage and increased operational costs due to downtime and recovery efforts. The impact is more pronounced in environments where parse-server is a critical component of the application infrastructure and where LiveQuery functionality is actively used.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade parse-server to version 9.6.0-alpha.19 or later, or 8.6.43 or later, where the issue is fixed. If upgrading immediately is not feasible, disabling the LiveQuery feature entirely is a practical workaround to prevent exploitation. Additionally, organizations should implement input validation and sanitization controls on client inputs that interact with LiveQuery subscriptions to block malformed regex patterns before they reach the server. Monitoring server logs for unexpected crashes or regex-related errors can help detect attempted exploitation. Employing runtime protections such as Node.js process supervisors (e.g., PM2) can automatically restart the server if it crashes, reducing downtime. Finally, applying network-level protections to restrict access to the parse-server LiveQuery endpoint to trusted clients can reduce exposure to remote attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T18:53:03.534Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb2001771bdb1749c89326

Added to database: 3/18/2026, 9:58:25 PM

Last enriched: 3/26/2026, 1:16:43 AM

Last updated: 5/3/2026, 12:06:45 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses