CVE-2026-33498
EUVD-2026-1497324.03.2026, 19:16
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.55 and 9.6.0-alpha.44, an attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944. This issue has been patched in versions 8.6.55 and 9.6.0-alpha.44.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| parseplatform | parse-server | 𝑥 < 8.6.55 |
| parseplatform | parse-server | 9.0.0 ≤ 𝑥 < 9.6.0 |
| parseplatform | parse-server | 9.6.0:alpha1 |
| parseplatform | parse-server | 9.6.0:alpha10 |
| parseplatform | parse-server | 9.6.0:alpha11 |
| parseplatform | parse-server | 9.6.0:alpha12 |
| parseplatform | parse-server | 9.6.0:alpha13 |
| parseplatform | parse-server | 9.6.0:alpha14 |
| parseplatform | parse-server | 9.6.0:alpha15 |
| parseplatform | parse-server | 9.6.0:alpha16 |
| parseplatform | parse-server | 9.6.0:alpha17 |
| parseplatform | parse-server | 9.6.0:alpha18 |
| parseplatform | parse-server | 9.6.0:alpha19 |
| parseplatform | parse-server | 9.6.0:alpha2 |
| parseplatform | parse-server | 9.6.0:alpha20 |
| parseplatform | parse-server | 9.6.0:alpha21 |
| parseplatform | parse-server | 9.6.0:alpha22 |
| parseplatform | parse-server | 9.6.0:alpha23 |
| parseplatform | parse-server | 9.6.0:alpha24 |
| parseplatform | parse-server | 9.6.0:alpha25 |
| parseplatform | parse-server | 9.6.0:alpha26 |
| parseplatform | parse-server | 9.6.0:alpha27 |
| parseplatform | parse-server | 9.6.0:alpha28 |
| parseplatform | parse-server | 9.6.0:alpha29 |
| parseplatform | parse-server | 9.6.0:alpha3 |
| parseplatform | parse-server | 9.6.0:alpha30 |
| parseplatform | parse-server | 9.6.0:alpha31 |
| parseplatform | parse-server | 9.6.0:alpha32 |
| parseplatform | parse-server | 9.6.0:alpha33 |
| parseplatform | parse-server | 9.6.0:alpha34 |
| parseplatform | parse-server | 9.6.0:alpha35 |
| parseplatform | parse-server | 9.6.0:alpha36 |
| parseplatform | parse-server | 9.6.0:alpha37 |
| parseplatform | parse-server | 9.6.0:alpha38 |
| parseplatform | parse-server | 9.6.0:alpha39 |
| parseplatform | parse-server | 9.6.0:alpha4 |
| parseplatform | parse-server | 9.6.0:alpha40 |
| parseplatform | parse-server | 9.6.0:alpha41 |
| parseplatform | parse-server | 9.6.0:alpha42 |
| parseplatform | parse-server | 9.6.0:alpha43 |
| parseplatform | parse-server | 9.6.0:alpha5 |
| parseplatform | parse-server | 9.6.0:alpha6 |
| parseplatform | parse-server | 9.6.0:alpha7 |
| parseplatform | parse-server | 9.6.0:alpha8 |
| parseplatform | parse-server | 9.6.0:alpha9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References