CVE-2026-32944: CWE-674: Uncontrolled Recursion in parse-community parse-server
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the server and denies service to all connected clients. Starting in version 9.6.0-alpha.21 and 8.6.45, a depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a breaking change. To mitigate, upgrade and set the option to a value appropriate for your app. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2026-32944 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting parse-community's parse-server, an open-source backend framework for Node.js environments. The flaw arises from the server's handling of query condition operators in client requests, where an attacker can craft a request containing excessively deep nested query operators. This triggers uncontrolled recursion within the server's query parsing logic, causing the Node.js process to crash due to stack overflow or resource exhaustion. The crash results in a denial of service (DoS), terminating the parse-server process and disconnecting all clients. This vulnerability affects parse-server versions >= 9.0.0 and < 9.6.0-alpha.21, as well as all versions below 8.6.45. To address this, versions 9.6.0-alpha.21 and 8.6.45 introduced a new server configuration option, requestComplexity.queryDepth, which sets a maximum allowed depth for nested query operators. However, this option is disabled by default to maintain backward compatibility, meaning vulnerable deployments must explicitly enable it after upgrading. No alternative workarounds are available, making upgrading and configuration essential. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but high impact on availability due to service termination.
Potential Impact
The primary impact of CVE-2026-32944 is a denial of service condition that can disrupt business operations relying on parse-server backends. Organizations using vulnerable versions may experience unexpected server crashes triggered by maliciously crafted queries, leading to downtime and loss of service availability for all connected clients. This can affect web and mobile applications dependent on parse-server for backend data management, potentially causing user dissatisfaction, loss of revenue, and damage to reputation. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk of automated or opportunistic attacks. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and high impact on availability make this a critical concern for any organization using affected versions. Additionally, denial of service attacks can be leveraged as part of larger multi-vector attacks or to distract from other malicious activities.
Mitigation Recommendations
To mitigate CVE-2026-32944, organizations should immediately upgrade parse-server to version 9.6.0-alpha.21 or later, or 8.6.45 or later, where the vulnerability is addressed. After upgrading, it is critical to enable and configure the requestComplexity.queryDepth option to enforce a maximum nesting depth for query condition operators. The appropriate depth value should be determined based on the application's typical query complexity to balance security and functionality. Since this option is disabled by default to avoid breaking changes, failure to enable it leaves the server vulnerable despite upgrading. Regularly monitor server logs for unusual query patterns that may indicate exploitation attempts. Implement network-level protections such as rate limiting and web application firewalls (WAFs) to detect and block suspicious requests with deeply nested queries. Additionally, maintain an incident response plan to quickly recover from potential denial of service events. Avoid exposing parse-server endpoints directly to untrusted networks without proper access controls.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Japan, South Korea
CVE-2026-32944: CWE-674: Uncontrolled Recursion in parse-community parse-server
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the server and denies service to all connected clients. Starting in version 9.6.0-alpha.21 and 8.6.45, a depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a breaking change. To mitigate, upgrade and set the option to a value appropriate for your app. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2026-32944 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting parse-community's parse-server, an open-source backend framework for Node.js environments. The flaw arises from the server's handling of query condition operators in client requests, where an attacker can craft a request containing excessively deep nested query operators. This triggers uncontrolled recursion within the server's query parsing logic, causing the Node.js process to crash due to stack overflow or resource exhaustion. The crash results in a denial of service (DoS), terminating the parse-server process and disconnecting all clients. This vulnerability affects parse-server versions >= 9.0.0 and < 9.6.0-alpha.21, as well as all versions below 8.6.45. To address this, versions 9.6.0-alpha.21 and 8.6.45 introduced a new server configuration option, requestComplexity.queryDepth, which sets a maximum allowed depth for nested query operators. However, this option is disabled by default to maintain backward compatibility, meaning vulnerable deployments must explicitly enable it after upgrading. No alternative workarounds are available, making upgrading and configuration essential. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but high impact on availability due to service termination.
Potential Impact
The primary impact of CVE-2026-32944 is a denial of service condition that can disrupt business operations relying on parse-server backends. Organizations using vulnerable versions may experience unexpected server crashes triggered by maliciously crafted queries, leading to downtime and loss of service availability for all connected clients. This can affect web and mobile applications dependent on parse-server for backend data management, potentially causing user dissatisfaction, loss of revenue, and damage to reputation. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk of automated or opportunistic attacks. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and high impact on availability make this a critical concern for any organization using affected versions. Additionally, denial of service attacks can be leveraged as part of larger multi-vector attacks or to distract from other malicious activities.
Mitigation Recommendations
To mitigate CVE-2026-32944, organizations should immediately upgrade parse-server to version 9.6.0-alpha.21 or later, or 8.6.45 or later, where the vulnerability is addressed. After upgrading, it is critical to enable and configure the requestComplexity.queryDepth option to enforce a maximum nesting depth for query condition operators. The appropriate depth value should be determined based on the application's typical query complexity to balance security and functionality. Since this option is disabled by default to avoid breaking changes, failure to enable it leaves the server vulnerable despite upgrading. Regularly monitor server logs for unusual query patterns that may indicate exploitation attempts. Implement network-level protections such as rate limiting and web application firewalls (WAFs) to detect and block suspicious requests with deeply nested queries. Additionally, maintain an incident response plan to quickly recover from potential denial of service events. Avoid exposing parse-server endpoints directly to untrusted networks without proper access controls.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T00:05:53.283Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bb2382771bdb1749c9897d
Added to database: 3/18/2026, 10:13:22 PM
Last enriched: 3/18/2026, 10:27:57 PM
Last updated: 3/19/2026, 2:05:37 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.