Cyber Posture

CVE-2026-32944

High

Published: 18 March 2026

Published
18 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0002 5.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32944 is a high-severity Uncontrolled Recursion (CWE-674) vulnerability in Parseplatform Parse-Server. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation through patching or upgrading Parse Server to versions that enforce query depth limits, directly addressing the uncontrolled recursion vulnerability.

prevent

Implements protections against denial-of-service attacks, including resource exhaustion from deeply nested query operators that crash the server process.

prevent

Restricts the quantity and complexity of query inputs, such as nesting depth of condition operators, to prevent server crashes from specially crafted requests.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

CVE enables remote unauthenticated DoS via crafted HTTP request exploiting uncontrolled recursion (CWE-674) to crash the Parse Server process, directly mapping to T1499.004 (Application or System Exploitation) for Endpoint Denial of Service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested…

more

query condition operators. This terminates the server and denies service to all connected clients. Starting in version 9.6.0-alpha.21 and 8.6.45, a depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a breaking change. To mitigate, upgrade and set the option to a value appropriate for your app. No known workarounds are available.

Deeper analysisAI

CVE-2026-32944 is a denial-of-service vulnerability in Parse Server, an open source backend deployable on any Node.js-compatible infrastructure. In versions prior to 9.6.0-alpha.21 and 8.6.45, the server fails to properly handle deeply nested query condition operators, allowing a specially crafted request to exhaust resources and crash the entire Parse Server process. This issue is classified under CWE-674 (Uncontrolled Recursion) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high-impact availability disruption without requiring authentication or user interaction.

An unauthenticated remote attacker can exploit this vulnerability by sending a single malicious HTTP request containing deeply nested query conditions to any exposed Parse Server endpoint. Successful exploitation terminates the server process, immediately denying service to all connected clients and requiring manual restart, potentially leading to prolonged outages in production environments.

Mitigation requires upgrading to Parse Server version 9.6.0-alpha.21 or 8.6.45, where a depth limit for query condition operator nesting is enforced via the `requestComplexity.queryDepth` server option. This option is disabled by default to prevent breaking changes, so administrators must explicitly configure an appropriate value post-upgrade. No workarounds are available, and relevant advisories are detailed in the Parse Server GitHub security advisory (GHSA-9xp9-j92r-p88v) and related pull requests (10202, 10203).

Details

CWE(s)

Affected Products

parseplatform
parse-server
9.6.0 · ≤ 8.6.45 · 9.0.0 — 9.6.0

CVEs Like This One

CVE-2026-33498Same product: Parseplatform Parse-Server
CVE-2026-33508Same product: Parseplatform Parse-Server
CVE-2026-33538Same product: Parseplatform Parse-Server
CVE-2026-34573Same product: Parseplatform Parse-Server
CVE-2026-32770Same product: Parseplatform Parse-Server
CVE-2026-32886Same product: Parseplatform Parse-Server
CVE-2026-30925Same product: Parseplatform Parse-Server
CVE-2026-30946Same product: Parseplatform Parse-Server
CVE-2026-30939Same product: Parseplatform Parse-Server
CVE-2026-30972Same product: Parseplatform Parse-Server

References