Cyber Posture

CVE-2026-30972

High

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0006 18.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30972 is a high-severity Improper Control of Interaction Frequency (CWE-799) vulnerability in Parseplatform Parse-Server. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-799

The control requires defining frequency, timing, and approval for security interactions, directly addressing uncontrolled interaction rates.

addresses: CWE-799

Allocation policies inherently restrict interaction frequency, reducing the impact of excessive requests.

addresses: CWE-799

Spam protection explicitly controls interaction frequency by detecting and acting on bulk unsolicited messages from external sources.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1498.001 Direct Network Flood Impact
Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Rate-limit bypass in public-facing Parse Server enables unauthenticated remote exploitation (T1190) to perform high-volume request flooding for resource exhaustion DoS (T1498.001 direct flood and T1499.004 application exploitation).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior o 9.5.2-alpha.10 and 8.6.23, Parse Server's rate limiting middleware is applied at the Express middleware layer, but the batch request endpoint…

more

(/batch) processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware including rate limiting. An attacker can bundle multiple requests targeting a rate-limited endpoint into a single batch request to circumvent the configured rate limit. Any Parse Server deployment that relies on the built-in rate limiting feature is affected. This vulnerability is fixed in 9.5.2-alpha.10 and 8.6.23.

Deeper analysisAI

CVE-2026-30972 is a rate limiting bypass vulnerability in Parse Server, an open source backend deployable on any Node.js infrastructure. In versions prior to 9.5.2-alpha.10 and 8.6.23, the rate limiting middleware operates at the Express middleware layer, but the /batch endpoint processes sub-requests internally through the Promise router. This routing bypasses Express middleware, including rate limiting, allowing attackers to bundle multiple requests targeting a rate-limited endpoint into a single batch request. Deployments relying on Parse Server's built-in rate limiting feature are affected, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and mapped to CWE-799 (Resource Management Errors).

Unauthenticated remote attackers can exploit this vulnerability by crafting a batch request that encapsulates numerous sub-requests to rate-limited endpoints, effectively circumventing configured rate limits. This enables excessive request volumes in a single HTTP call, potentially overwhelming server resources and causing denial of service through resource exhaustion, as indicated by the high availability impact in the CVSS score.

The Parse community addressed this in releases 8.6.23 and 9.5.2-alpha.10, with details available in the GitHub security advisory GHSA-775h-3xrc-c228 and corresponding release notes. Security practitioners should upgrade to these fixed versions and review configurations relying on built-in rate limiting, considering additional server-level protections like external rate limiters.

Details

CWE(s)

Affected Products

parseplatform
parse-server
9.5.2 · ≤ 8.6.23 · 9.0.0 — 9.5.2

CVEs Like This One

CVE-2026-30946Same product: Parseplatform Parse-Server
CVE-2026-33508Same product: Parseplatform Parse-Server
CVE-2026-30939Same product: Parseplatform Parse-Server
CVE-2026-34784Same product: Parseplatform Parse-Server
CVE-2026-30947Same product: Parseplatform Parse-Server
CVE-2026-33538Same product: Parseplatform Parse-Server
CVE-2026-32944Same product: Parseplatform Parse-Server
CVE-2026-33498Same product: Parseplatform Parse-Server
CVE-2026-34573Same product: Parseplatform Parse-Server
CVE-2026-30967Same product: Parseplatform Parse-Server

References