Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33508: CWE-674: Uncontrolled Recursion in parse-community parse-server

0
High
VulnerabilityCVE-2026-33508cvecve-2026-33508cwe-674
Published: Tue Mar 24 2026 (03/24/2026, 18:21:08 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-33508 is a high-severity vulnerability in the Parse Server LiveQuery component affecting versions prior to 8. 6. 56 and 9. 6. 0-alpha. 45. The flaw arises from uncontrolled recursion when processing WebSocket subscription requests with deeply nested logical operators, bypassing the requestComplexity. queryDepth limit. This leads to excessive CPU consumption, causing service degradation or denial of service. Exploitation requires no authentication or user interaction and can be triggered remotely over the network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 18:47:16 UTC

Technical Analysis

Parse Server, an open-source backend platform running on Node.js, includes a LiveQuery feature that allows clients to subscribe to real-time data updates via WebSocket connections. In versions prior to 8.6.56 and 9.6.0-alpha.45, the LiveQuery component fails to enforce the configured requestComplexity.queryDepth limit when processing subscription requests. This configuration is intended to restrict the depth of nested logical operators in queries to prevent excessive resource consumption. However, due to uncontrolled recursion in the query parsing logic (classified under CWE-674: Uncontrolled Recursion), an attacker can craft subscription requests containing deeply nested logical operators that cause the server to recurse excessively. This results in high CPU usage, potentially degrading server performance or causing denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk. The issue has been addressed in versions 8.6.56 and 9.6.0-alpha.45 by properly enforcing the queryDepth limit during request processing. No public exploits have been reported yet, but the high CVSS 8.2 score reflects the significant impact on availability and ease of exploitation.

Potential Impact

This vulnerability primarily impacts the availability of services running Parse Server with the affected LiveQuery versions. An attacker can remotely trigger excessive CPU consumption, leading to degraded performance or complete denial of service. Organizations relying on real-time data updates via LiveQuery may experience outages or slowdowns, affecting user experience and potentially causing business disruption. Since no authentication is required, attackers can exploit this vulnerability at scale, increasing the risk of widespread service interruptions. The vulnerability does not directly affect confidentiality or integrity but can indirectly impact business operations and trust. Services exposed to the internet or with insufficient network controls are at higher risk. The lack of known exploits currently provides a window for remediation before active attacks emerge.

Mitigation Recommendations

The primary mitigation is to upgrade Parse Server to version 8.6.56 or later, or 9.6.0-alpha.45 or later, where the vulnerability is patched. Organizations should audit their Parse Server deployments to identify affected versions and plan immediate upgrades. Additionally, administrators should review and tighten the requestComplexity.queryDepth configuration to enforce reasonable limits on query complexity. Implementing Web Application Firewalls (WAFs) or rate limiting on WebSocket connections can help detect and block abnormal subscription request patterns indicative of exploitation attempts. Monitoring CPU usage and LiveQuery request logs for spikes or unusual nested query structures can provide early warning signs. Network segmentation and restricting access to LiveQuery endpoints to trusted clients can reduce exposure. Finally, maintaining an incident response plan for denial-of-service scenarios involving backend services is advisable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:59:08.889Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2d884f4197a8e3b5f9667

Added to database: 3/24/2026, 6:31:32 PM

Last enriched: 3/24/2026, 6:47:16 PM

Last updated: 3/24/2026, 10:06:51 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses