Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the server and denies service to all connected clients. Starting in version 9.6.0-alpha.21 and 8.6.45, a depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a breaking change. To mitigate, upgrade and set the option to a value appropriate for your app. No known workarounds are available.
INFO
Published Date :
2026-03-18T21:50:08.390Z
Last Modified :
2026-03-19T16:56:38.160Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32944 vulnerability.
| Vendors | Products |
|---|---|
| Parse Community |
|
| Parseplatform |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32944.