Impact
Parse Server allows an unauthenticated attacker to send a request containing deeply nested query condition operators that causes the server process to crash. The crash terminates the service, denying access to all connected clients. The vulnerability is rooted in improper limit validation (CWE-674) and results in a denial of service rather than code execution or data exposure.
Affected Systems
The affected product is Parse Server from Parse Community. Versions prior to 9.6.0‑alpha.21 and 8.6.45 are vulnerable. All earlier releases should be considered at risk until upgraded.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. The EPSS score is under 1%, suggesting a low probability of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Because the attack vector is unauthenticated and only requires sending a specially crafted HTTP request, the risk is that any user with network access to the server could trigger the crash. The mitigation introduced a requestComplexity.queryDepth option, which limits nesting but is disabled by default to avoid breaking changes.
OpenCVE Enrichment
Github GHSA