Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33498: CWE-674: Uncontrolled Recursion in parse-community parse-server

0
High
VulnerabilityCVE-2026-33498cvecve-2026-33498cwe-674
Published: Tue Mar 24 2026 (03/24/2026, 18:18:44 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-33498 is a high-severity vulnerability in parse-community's parse-server, allowing unauthenticated attackers to cause a denial of service by sending deeply nested queries with logical operators. This triggers uncontrolled recursion, causing the server process to hang indefinitely and become unresponsive, requiring manual restart. The flaw affects versions prior to 8. 6. 55 and between 9. 0. 0 and 9. 6. 0-alpha. 44, bypassing a previous fix for CVE-2026-32944.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 18:47:39 UTC

Technical Analysis

CVE-2026-33498 is a denial-of-service vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting parse-community's parse-server, an open-source backend platform for Node.js environments. The issue arises when an attacker sends an unauthenticated HTTP request containing a deeply nested query with logical operators. The server's query parser fails to handle such input properly, resulting in uncontrolled recursion that causes the process to hang indefinitely. This leads to a complete denial of service as the server becomes unresponsive and requires manual intervention to restart. The vulnerability affects parse-server versions prior to 8.6.55 and versions from 9.0.0 up to but not including 9.6.0-alpha.44, effectively bypassing the earlier fix for CVE-2026-32944. The CVSS v4.0 score is 8.7, indicating a high severity with characteristics including network attack vector, no required privileges or user interaction, and a high impact on availability. No known exploits are currently reported in the wild. The vulnerability is critical for any deployment relying on parse-server for backend services, especially those exposed to the internet without additional filtering or protections. The patch is available in versions 8.6.55 and 9.6.0-alpha.44, and upgrading is the primary remediation step.

Potential Impact

The primary impact of CVE-2026-33498 is a denial of service condition that can render parse-server instances completely unresponsive. This affects the availability of backend services relying on parse-server, potentially causing downtime for applications and services that depend on it. Since the exploit requires no authentication and can be triggered remotely over the network, attackers can easily disrupt services at scale. Organizations using vulnerable versions may face operational disruptions, loss of customer trust, and potential financial losses due to service outages. The vulnerability could also be leveraged as part of a larger attack chain to distract or exhaust resources while other attacks are conducted. Given parse-server's use in mobile and web app backends, the impact could extend to a wide range of industries including technology, finance, healthcare, and retail. The lack of user interaction and privileges required for exploitation increases the risk of widespread abuse.

Mitigation Recommendations

To mitigate CVE-2026-33498, organizations should immediately upgrade parse-server to version 8.6.55 or later, or to 9.6.0-alpha.44 or later if using the 9.x alpha branch. In addition to patching, implement network-level protections such as Web Application Firewalls (WAFs) or API gateways that can detect and block unusually deep or complex query structures to prevent exploitation attempts. Rate limiting and request size restrictions can also reduce the risk of denial of service. Monitoring server logs for abnormal query patterns and setting up alerting for high CPU or memory usage spikes can help detect exploitation attempts early. For environments where immediate patching is not feasible, consider isolating parse-server instances behind VPNs or internal networks to limit exposure. Regularly review and update dependency versions and maintain a robust patch management process to prevent recurrence of similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:59:08.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2d884f4197a8e3b5f9660

Added to database: 3/24/2026, 6:31:32 PM

Last enriched: 3/24/2026, 6:47:39 PM

Last updated: 3/24/2026, 8:41:29 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses