Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32944: CWE-674: Uncontrolled Recursion in parse-community parse-server

0
High
VulnerabilityCVE-2026-32944cvecve-2026-32944cwe-674
Published: Wed Mar 18 2026 (03/18/2026, 21:50:08 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the server and denies service to all connected clients. Starting in version 9.6.0-alpha.21 and 8.6.45, a depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a breaking change. To mitigate, upgrade and set the option to a value appropriate for your app. No known workarounds are available.

AI-Powered Analysis

AILast updated: 03/18/2026, 22:27:57 UTC

Technical Analysis

CVE-2026-32944 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting parse-community's parse-server, an open-source backend framework for Node.js environments. The flaw arises from the server's handling of query condition operators in client requests, where an attacker can craft a request containing excessively deep nested query operators. This triggers uncontrolled recursion within the server's query parsing logic, causing the Node.js process to crash due to stack overflow or resource exhaustion. The crash results in a denial of service (DoS), terminating the parse-server process and disconnecting all clients. This vulnerability affects parse-server versions >= 9.0.0 and < 9.6.0-alpha.21, as well as all versions below 8.6.45. To address this, versions 9.6.0-alpha.21 and 8.6.45 introduced a new server configuration option, requestComplexity.queryDepth, which sets a maximum allowed depth for nested query operators. However, this option is disabled by default to maintain backward compatibility, meaning vulnerable deployments must explicitly enable it after upgrading. No alternative workarounds are available, making upgrading and configuration essential. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but high impact on availability due to service termination.

Potential Impact

The primary impact of CVE-2026-32944 is a denial of service condition that can disrupt business operations relying on parse-server backends. Organizations using vulnerable versions may experience unexpected server crashes triggered by maliciously crafted queries, leading to downtime and loss of service availability for all connected clients. This can affect web and mobile applications dependent on parse-server for backend data management, potentially causing user dissatisfaction, loss of revenue, and damage to reputation. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk of automated or opportunistic attacks. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and high impact on availability make this a critical concern for any organization using affected versions. Additionally, denial of service attacks can be leveraged as part of larger multi-vector attacks or to distract from other malicious activities.

Mitigation Recommendations

To mitigate CVE-2026-32944, organizations should immediately upgrade parse-server to version 9.6.0-alpha.21 or later, or 8.6.45 or later, where the vulnerability is addressed. After upgrading, it is critical to enable and configure the requestComplexity.queryDepth option to enforce a maximum nesting depth for query condition operators. The appropriate depth value should be determined based on the application's typical query complexity to balance security and functionality. Since this option is disabled by default to avoid breaking changes, failure to enable it leaves the server vulnerable despite upgrading. Regularly monitor server logs for unusual query patterns that may indicate exploitation attempts. Implement network-level protections such as rate limiting and web application firewalls (WAFs) to detect and block suspicious requests with deeply nested queries. Additionally, maintain an incident response plan to quickly recover from potential denial of service events. Avoid exposing parse-server endpoints directly to untrusted networks without proper access controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T00:05:53.283Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2382771bdb1749c9897d

Added to database: 3/18/2026, 10:13:22 PM

Last enriched: 3/18/2026, 10:27:57 PM

Last updated: 3/19/2026, 2:05:37 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses