Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33498: CWE-674: Uncontrolled Recursion in parse-community parse-server

0
High
VulnerabilityCVE-2026-33498cvecve-2026-33498cwe-674
Published: Tue Mar 24 2026 (03/24/2026, 18:18:44 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.55 and 9.6.0-alpha.44, an attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944. This issue has been patched in versions 8.6.55 and 9.6.0-alpha.44.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 19:49:54 UTC

Technical Analysis

CVE-2026-33498 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting parse-community's parse-server, an open-source backend framework for Node.js environments. The flaw arises when the server processes unauthenticated HTTP requests containing deeply nested queries with logical operators. These queries trigger uncontrolled recursion in the query parsing logic, causing the server process to hang indefinitely and become unresponsive. This results in a denial-of-service (DoS) condition requiring manual intervention to restart the server. The vulnerability affects parse-server versions earlier than 8.6.55 and versions from 9.0.0 up to 9.6.0-alpha.44, effectively bypassing the prior fix implemented for CVE-2026-32944. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, no required privileges or user interaction, and a high impact on availability. No known exploits have been reported in the wild as of the publication date. The issue is resolved in versions 8.6.55 and 9.6.0-alpha.44 by correcting the recursion handling in the query parser.

Potential Impact

The primary impact of CVE-2026-33498 is a denial-of-service condition that can render parse-server instances completely unresponsive. Organizations relying on parse-server for backend services risk service outages, potentially affecting applications and end-users dependent on these services. Since the attack requires no authentication and can be triggered remotely over the network, it poses a significant risk to publicly accessible parse-server deployments. The downtime caused by the server hang can lead to operational disruptions, loss of availability, and potential reputational damage. Additionally, manual intervention is required to restore service, increasing operational overhead. While no data confidentiality or integrity impact is indicated, the availability impact alone is critical for business continuity, especially for organizations using parse-server in production environments.

Mitigation Recommendations

To mitigate CVE-2026-33498, organizations should immediately upgrade parse-server to version 8.6.55 or later, or 9.6.0-alpha.44 or later, where the vulnerability has been patched. For environments where immediate upgrade is not feasible, implementing network-level protections such as Web Application Firewalls (WAFs) to detect and block deeply nested or suspicious query patterns can reduce exposure. Rate limiting and IP reputation filtering can also help mitigate attack attempts. Monitoring parse-server logs for unusual query patterns or repeated requests with complex nested logical operators can provide early detection. Additionally, isolating parse-server instances behind VPNs or restricting access to trusted networks reduces the attack surface. Regularly reviewing and applying security updates from the parse-community project is essential to maintain protection against similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:59:08.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2d884f4197a8e3b5f9660

Added to database: 3/24/2026, 6:31:32 PM

Last enriched: 3/31/2026, 7:49:54 PM

Last updated: 5/7/2026, 12:15:05 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses