CVE-2026-33508
Received Received - Intake
Excessive Recursion DoS in Parse Server LiveQuery Component

Publication date: 2026-03-24

Last updated on: 2026-03-25

Assigner: GitHub, Inc.

Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.56 and 9.6.0-alpha.45, Parse Server's LiveQuery component does not enforce the requestComplexity.queryDepth configuration setting when processing WebSocket subscription requests. An attacker can send a subscription with deeply nested logical operators, causing excessive recursion and CPU consumption that degrades or disrupts service availability. This issue has been patched in versions 8.6.56 and 9.6.0-alpha.45.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 46 associated CPEs
Vendor Product Version / Range
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server From 9.0.0 (inc) to 9.6.0 (exc)
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server to 8.6.56 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-674 The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "This vulnerability exists in the Parse Server's LiveQuery feature, where it fails to enforce limits on the nesting depth of query conditions in WebSocket subscription requests."}, {'type': 'paragraph', 'content': 'An attacker can exploit this by sending subscription queries with deeply nested logical operators such as $or, $and, and $nor. This causes excessive recursion and high CPU consumption on the server.'}, {'type': 'paragraph', 'content': "As a result, the server's performance degrades or the service becomes unavailable, effectively causing a denial-of-service (DoS) condition."}, {'type': 'paragraph', 'content': 'The issue was fixed by adding a validation step that checks the nesting depth of query conditions before processing subscriptions, rejecting queries that exceed the configured maximum depth.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can impact you by allowing an attacker to disrupt the availability of your Parse Server backend.'}, {'type': 'paragraph', 'content': 'By sending subscription queries with excessively deep nesting, an attacker can cause high CPU usage and excessive recursion, which degrades server performance or causes the service to become unavailable.'}, {'type': 'paragraph', 'content': "This denial-of-service (DoS) condition can interrupt your application's real-time features that rely on LiveQuery subscriptions, potentially affecting user experience and business operations."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring LiveQuery subscription requests to the Parse Server for deeply nested logical operators such as $or, $and, and $nor in the query conditions.

Specifically, queries that exceed the configured maximum nesting depth in the requestComplexity.queryDepth setting indicate potential exploitation attempts.

Detection can involve inspecting WebSocket subscription requests for unusually complex or deeply nested query structures.

While no explicit commands are provided in the resources, administrators can enable detailed logging on the Parse Server to capture subscription queries and analyze them for excessive nesting.

Additionally, monitoring for Parse.Error.INVALID_QUERY errors related to query condition nesting depth exceeding the allowed maximum can help identify attempted exploitations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade Parse Server to version 8.6.56 or later, or 9.6.0-alpha.45 or later, where the issue has been patched.

Ensure that the requestComplexity.queryDepth configuration setting is enabled and set to a reasonable maximum nesting depth (e.g., 10) to enforce limits on query complexity.

Avoid disabling the queryDepth check by not setting it to -1, as this disables the depth validation and leaves the server vulnerable.

If upgrading immediately is not possible, consider monitoring and blocking WebSocket subscription requests with deeply nested logical operators to reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart