CVE-2026-33538
EUVD-2026-1497524.03.2026, 19:16
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.58 and 9.6.0-alpha.52, an unauthenticated attacker can cause denial of service by sending authentication requests with arbitrary, unconfigured provider names. The server executes a database query for each unconfigured provider before rejecting the request, and since no database index exists for unconfigured providers, each request triggers a full collection scan on the user database. This can be parallelized to saturate database resources. This issue has been patched in versions 8.6.58 and 9.6.0-alpha.52.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| parseplatform | parse-server | 𝑥 < 8.6.58 |
| parseplatform | parse-server | 9.0.0 ≤ 𝑥 < 9.6.0 |
| parseplatform | parse-server | 9.6.0:alpha1 |
| parseplatform | parse-server | 9.6.0:alpha10 |
| parseplatform | parse-server | 9.6.0:alpha11 |
| parseplatform | parse-server | 9.6.0:alpha12 |
| parseplatform | parse-server | 9.6.0:alpha13 |
| parseplatform | parse-server | 9.6.0:alpha14 |
| parseplatform | parse-server | 9.6.0:alpha15 |
| parseplatform | parse-server | 9.6.0:alpha16 |
| parseplatform | parse-server | 9.6.0:alpha17 |
| parseplatform | parse-server | 9.6.0:alpha18 |
| parseplatform | parse-server | 9.6.0:alpha19 |
| parseplatform | parse-server | 9.6.0:alpha2 |
| parseplatform | parse-server | 9.6.0:alpha20 |
| parseplatform | parse-server | 9.6.0:alpha21 |
| parseplatform | parse-server | 9.6.0:alpha22 |
| parseplatform | parse-server | 9.6.0:alpha23 |
| parseplatform | parse-server | 9.6.0:alpha24 |
| parseplatform | parse-server | 9.6.0:alpha25 |
| parseplatform | parse-server | 9.6.0:alpha26 |
| parseplatform | parse-server | 9.6.0:alpha27 |
| parseplatform | parse-server | 9.6.0:alpha28 |
| parseplatform | parse-server | 9.6.0:alpha29 |
| parseplatform | parse-server | 9.6.0:alpha3 |
| parseplatform | parse-server | 9.6.0:alpha30 |
| parseplatform | parse-server | 9.6.0:alpha31 |
| parseplatform | parse-server | 9.6.0:alpha32 |
| parseplatform | parse-server | 9.6.0:alpha33 |
| parseplatform | parse-server | 9.6.0:alpha34 |
| parseplatform | parse-server | 9.6.0:alpha35 |
| parseplatform | parse-server | 9.6.0:alpha36 |
| parseplatform | parse-server | 9.6.0:alpha37 |
| parseplatform | parse-server | 9.6.0:alpha38 |
| parseplatform | parse-server | 9.6.0:alpha39 |
| parseplatform | parse-server | 9.6.0:alpha4 |
| parseplatform | parse-server | 9.6.0:alpha40 |
| parseplatform | parse-server | 9.6.0:alpha41 |
| parseplatform | parse-server | 9.6.0:alpha42 |
| parseplatform | parse-server | 9.6.0:alpha43 |
| parseplatform | parse-server | 9.6.0:alpha44 |
| parseplatform | parse-server | 9.6.0:alpha45 |
| parseplatform | parse-server | 9.6.0:alpha46 |
| parseplatform | parse-server | 9.6.0:alpha47 |
| parseplatform | parse-server | 9.6.0:alpha48 |
| parseplatform | parse-server | 9.6.0:alpha49 |
| parseplatform | parse-server | 9.6.0:alpha5 |
| parseplatform | parse-server | 9.6.0:alpha50 |
| parseplatform | parse-server | 9.6.0:alpha51 |
| parseplatform | parse-server | 9.6.0:alpha6 |
| parseplatform | parse-server | 9.6.0:alpha7 |
| parseplatform | parse-server | 9.6.0:alpha8 |
| parseplatform | parse-server | 9.6.0:alpha9 |
𝑥
= Vulnerable software versions
References