Parse Server has a query condition depth bypass via pre-validation transform pipeline
- Severity:
- High
Description
An attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.55 >= 9.0.0, < 9.6.0-alpha.44** Patched version(s): **8.6.55 9.6.0-alpha.44**
References
Related Issues
- Parse Server has a protected fields bypass via dot-notation in query and sort - CVE-2026-31872
- Parse Server has an auth provider validation bypass on login via partial authData - CVE-2026-33409
- Parse Server has a protected fields bypass via logical query operators - CVE-2026-30962
- Parse Server has a password reset token single-use bypass via concurrent requests - CVE-2026-32943
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 20, 2026