Impact
Parse Server provides open‑source backend functionality through REST and GraphQL APIs. An unauthenticated attacker can send crafted queries that trigger unbounded query complexity, causing the server to consume excessive CPU, memory and database connections. This results in application slowdown or crash, effectively denying legitimate users access. The weakness is identified as unchecked resource consumption (CWE‑770).
Affected Systems
All installations of Parse Server running any version prior to 9.5.2‑alpha.2 or 8.6.15 are affected, regardless of deployment environment as long as the REST or GraphQL API is enabled. The vulnerability applies to any infrastructure capable of executing the server under Node.js.
Risk and Exploitability
The vulnerability has a high CVSS score of 8.7, indicating significant impact. The EPSS score is below 1%, suggesting a low probability of exploitation at present, and it is not listed in the CISA KEV catalog. The likely attack vector is an unauthenticated attacker sending crafted API requests that probe the lack of query complexity limits.
OpenCVE Enrichment
Github GHSA