Parse Server has a query condition depth bypass via pre-validation transform pipeline
High severity
GitHub Reviewed
Published
Mar 20, 2026
in
parse-community/parse-server
•
Updated Mar 20, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.44
< 8.6.55
Patched versions
9.6.0-alpha.44
8.6.55
Description
Published to the GitHub Advisory Database
Mar 20, 2026
Reviewed
Mar 20, 2026
Last updated
Mar 20, 2026
Impact
An attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944.
Patches
The query condition nesting depth is now validated before the query enters the transformation pipeline, preventing deeply nested structures from being recursively processed before the existing depth guard can fire.
Workarounds
None.
References