Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.55 and 9.6.0-alpha.44, an attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944. This issue has been patched in versions 8.6.55 and 9.6.0-alpha.44.
Parse Server: Query condition depth bypass via pre-validation transform pipeline
Problem type
Affected products
parse-community
< 8.6.55 - AFFECTED
>= 9.0.0, < 9.6.0-alpha.44 - AFFECTED
References
https://github.com/parse-community/parse-server/security/advisories/GHSA-9fjp-q3c4-6w3j
https://github.com/parse-community/parse-server/pull/10257
https://github.com/parse-community/parse-server/pull/10258
https://github.com/parse-community/parse-server/commit/2581b5426047ce9cbcd3d9c0e8379e9c30e23ab5
https://github.com/parse-community/parse-server/commit/85994eff9e7b34cac7e1a2f5791985022a1461d1
GitHub Security Advisories
GHSA-9fjp-q3c4-6w3j
Parse Server has a query condition depth bypass via pre-validation transform pipeline
https://github.com/advisories/GHSA-9fjp-q3c4-6w3jImpact
An attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944.
Patches
The query condition nesting depth is now validated before the query enters the transformation pipeline, preventing deeply nested structures from being recursively processed before the existing depth guard can fire.
Workarounds
None.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-33498Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-33498",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"dateUpdated": "2026-03-24T18:18:44.587Z",
"dateReserved": "2026-03-20T16:59:08.887Z",
"datePublished": "2026-03-24T18:18:44.587Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2026-03-24T18:18:44.587Z"
},
"title": "Parse Server: Query condition depth bypass via pre-validation transform pipeline",
"descriptions": [
{
"lang": "en",
"value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.55 and 9.6.0-alpha.44, an attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944. This issue has been patched in versions 8.6.55 and 9.6.0-alpha.44."
}
],
"affected": [
{
"vendor": "parse-community",
"product": "parse-server",
"versions": [
{
"version": "< 8.6.55",
"status": "affected"
},
{
"version": ">= 9.0.0, < 9.6.0-alpha.44",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion",
"cweId": "CWE-674",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-9fjp-q3c4-6w3j",
"name": "https://github.com/parse-community/parse-server/security/advisories/GHSA-9fjp-q3c4-6w3j",
"tags": [
"x_refsource_CONFIRM"
]
},
{
"url": "https://github.com/parse-community/parse-server/pull/10257",
"name": "https://github.com/parse-community/parse-server/pull/10257",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/parse-community/parse-server/pull/10258",
"name": "https://github.com/parse-community/parse-server/pull/10258",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/parse-community/parse-server/commit/2581b5426047ce9cbcd3d9c0e8379e9c30e23ab5",
"name": "https://github.com/parse-community/parse-server/commit/2581b5426047ce9cbcd3d9c0e8379e9c30e23ab5",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/parse-community/parse-server/commit/85994eff9e7b34cac7e1a2f5791985022a1461d1",
"name": "https://github.com/parse-community/parse-server/commit/85994eff9e7b34cac7e1a2f5791985022a1461d1",
"tags": [
"x_refsource_MISC"
]
}
],
"metrics": [
{}
]
}
}
}