Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround.
Published: 2026-03-18
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (server crash)
Action: Patch Immediately
AI Analysis

Impact

Parse Server, an open‑source Node.js backend, has a flaw that lets a remote caller crash the server process. By sending a cloud function request with a crafted function name that walks up the JavaScript prototype chain of the registered cloud‑function handlers, the code triggers a stack overflow, causing the server to terminate unexpectedly. This condition maps to the prototype chain traversal weakness (CWE‑1321) and results in a denial‑of‑service impact.

Affected Systems

The vulnerability affects parse-community:parse-server on all releases prior to version 9.6.0‑alpha.24 and 8.6.47. Any deployment of Parse Server that is running one of the listed CPEs (e.g., 9.6.0‑alpha.1 through alpha.23, 8.6.x prior to 8.6.47, or any of the alpha pre‑releases in the provided list) is susceptible. These installations can be hosted on any infrastructure that can run Node.js.

Risk and Exploitability

The CVSS score of 8.2 classifies this as a high‑severity vulnerability, while the EPSS score of less than 1% indicates a low probability of active exploitation today. It is not included in the CISA KEV catalog. The attack vector is remote: a client can trigger the crash by invoking the cloud‑function endpoint with an inappropriate function name. Consequently, while the impact on availability is substantial, the overall current risk level may be moderate due to the low exploitation likelihood, but the lack of a workaround makes timely patching essential.

Generated by OpenCVE AI on March 19, 2026 at 18:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Parse Server to version 9.6.0‑alpha.24 or later, or 8.6.47 or later, which restricts property lookups during cloud function name resolution.
  • Verify that the upgrade has succeeded by confirming the server starts without crashing on dummy function calls.
  • Restrict network access to the cloud‑function API to trusted hosts or IP ranges via firewall or ingress rules to reduce exposure.
  • Monitor application logs for repeated invalid function name attempts and investigate anomalous activity.

Generated by OpenCVE AI on March 19, 2026 at 18:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4263-jgmp-7pf4 Parse Server's Cloud function dispatch crashes server via prototype chain traversal
History

Thu, 19 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Parseplatform
Parseplatform parse-server
CPEs cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha10:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha11:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha12:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha13:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha14:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha15:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha16:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha17:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha18:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha19:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha20:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha21:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha22:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha23:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha8:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha9:*:*:*:node.js:*:*
Vendors & Products Parseplatform
Parseplatform parse-server
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Thu, 19 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Parse Community
Parse Community parse Server
Vendors & Products Parse Community
Parse Community parse Server

Wed, 18 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround.
Title Parse Server's Cloud function dispatch crashes server via prototype chain traversal
Weaknesses CWE-1321
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Parse Community Parse Server
Parseplatform Parse-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-19T16:34:34.333Z

Reserved: 2026-03-16T21:03:44.421Z

Link: CVE-2026-32886

cve-icon Vulnrichment

Updated: 2026-03-19T16:27:01.422Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T22:16:25.663

Modified: 2026-03-19T17:21:45.437

Link: CVE-2026-32886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:52:02Z

Weaknesses