Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. parse-server
  4. ›
  5. CVE-2026-33508

CVE-2026-33508: Parse Server LiveQuery subscription query depth bypass

March 20, 2026

Parse Server’s LiveQuery component does not enforce the requestComplexity.queryDepth configuration setting when processing WebSocket subscription requests. An attacker can send a subscription with deeply nested logical operators, causing excessive recursion and CPU consumption that degrades or disrupts service availability.

Deployments are affected when the LiveQuery WebSocket endpoint is reachable by untrusted clients.

References

  • github.com/advisories/GHSA-6qh5-m6g3-xhq6
  • github.com/parse-community/parse-server
  • github.com/parse-community/parse-server/pull/10259
  • github.com/parse-community/parse-server/pull/10260
  • github.com/parse-community/parse-server/security/advisories/GHSA-6qh5-m6g3-xhq6
  • nvd.nist.gov/vuln/detail/CVE-2026-33508

Code Behaviors & Features

Detect and mitigate CVE-2026-33508 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.6.56, all versions starting from 9.0.0 before 9.6.0-alpha.45

Fixed versions

  • 9.6.0-alpha.45
  • 8.6.56

Solution

Upgrade to versions 8.6.56, 9.6.0-alpha.45 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-674: Uncontrolled Recursion

Source file

npm/parse-server/CVE-2026-33508.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 21 Mar 2026 00:17:15 +0000.