๐Ÿ” CVE Alert

CVE-2026-32770

MEDIUM 5.9

Parse Server: LiveQuery subscription with invalid regular expression crashes server

CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
0th

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.19 and 8.6.43, a remote attacker can crash the Parse Server by subscribing to a LiveQuery with an invalid regular expression pattern. The server process terminates when the invalid pattern reaches the regex engine during subscription matching, causing denial of service for all connected clients. The fix in 9.6.0-alpha.19 and 8.6.43 validates regular expression patterns at subscription time, rejecting invalid patterns before they are stored. Additionally, a defense-in-depth try-catch prevents any subscription matching error from crashing the server process. As a workaround, disable LiveQuery if it is not needed.

CWE CWE-248
Vendor parse-community
Product parse-server
Published Mar 18, 2026
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for parse-community parse-server

Be the first to know when new medium vulnerabilities affecting parse-community parse-server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

parse-community / parse-server
>= 9.0.0, < 9.6.0-alpha.19 < 8.6.43

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/parse-community/parse-server/security/advisories/GHSA-827p-g5x5-h86c github.com: https://github.com/parse-community/parse-server/pull/10197 github.com: https://github.com/parse-community/parse-server/pull/10199