Description
Parse Server’s LiveQuery component does not enforce the requestComplexity.queryDepth configuration setting when processing WebSocket subscription requests. An attacker can send a subscription with deeply nested logical operators, causing excessive recursion and CPU consumption that degrades or disrupts service availability.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.56 >= 9.0.0, < 9.6.0-alpha.45** Patched version(s): **8.6.56 9.6.0-alpha.45**
References
Related Issues
- Parse Server has a query condition depth bypass via pre-validation transform pipeline - CVE-2026-33498
- Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause - CVE-2026-32098
- Parse Server has a protected fields bypass via logical query operators - CVE-2026-30962
- Parse Server has a protected fields bypass via dot-notation in query and sort - CVE-2026-31872
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 20, 2026