Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32944

CVE-2026-32944: Parse-server DoS Vulnerability

CVE-2026-32944 is a denial of service vulnerability in Parseplatform Parse-server that allows unauthenticated attackers to crash the server with deeply nested queries. This article covers technical details, affected versions, and mitigation.

Published: March 20, 2026

CVE-2026-32944 Overview

Parse Server, an open source backend that can be deployed to any infrastructure running Node.js, contains a denial of service vulnerability in versions prior to 9.6.0-alpha.21 and 8.6.45. An unauthenticated attacker can crash the Parse Server process by sending a single request containing deeply nested query condition operators. This vulnerability terminates the server and denies service to all connected clients, making it a significant availability concern for applications relying on Parse Server.

Critical Impact

A single malicious request from an unauthenticated attacker can crash the entire Parse Server instance, causing complete service disruption for all connected clients.

Affected Products

  • Parse Server versions prior to 8.6.45
  • Parse Server versions 9.6.0-alpha1 through 9.6.0-alpha20
  • Any Parse Server deployment on Node.js infrastructure without query depth limiting

Discovery Timeline

  • 2026-03-18 - CVE-2026-32944 published to NVD
  • 2026-03-19 - Last updated in NVD database

Technical Details for CVE-2026-32944

Vulnerability Analysis

This vulnerability (CWE-674: Uncontrolled Recursion) exists in Parse Server's query processing mechanism. The server fails to impose depth limits on nested query condition operators, allowing attackers to craft requests with extremely deep nesting structures. When the server attempts to process these deeply nested queries, it exhausts available resources and crashes.

The vulnerability is particularly concerning because it requires no authentication to exploit. Any user who can send requests to the Parse Server API can trigger the denial of service condition. The attack can be executed with a single crafted request, making it trivial to exploit and highly impactful.

Root Cause

The root cause is the absence of depth validation for query condition operators in Parse Server's request handling logic. Prior to the fix, Parse Server would recursively process query conditions without checking how deeply nested they were. This lack of boundary checking allows malicious input to trigger uncontrolled recursion, ultimately causing a stack overflow or resource exhaustion that crashes the Node.js process.

Attack Vector

The attack is conducted over the network and requires no user interaction or authentication. An attacker constructs a query request containing condition operators (such as $and, $or, $not) nested to an extreme depth. When this request is submitted to the Parse Server API endpoint, the server attempts to parse and process the deeply nested structure.

The deeply nested query causes the server to perform recursive operations that exceed safe limits, leading to a crash. Since Parse Server runs as a single Node.js process in typical deployments, this crash terminates service for all clients. The attack can be repeated continuously to maintain the denial of service condition.

Detection Methods for CVE-2026-32944

Indicators of Compromise

  • Parse Server process unexpectedly terminating or restarting frequently
  • Large incoming requests to Parse Server API endpoints containing deeply nested JSON structures
  • Error logs indicating stack overflow or maximum call stack size exceeded
  • Unusual patterns of single requests followed by immediate server crashes

Detection Strategies

  • Monitor Parse Server process health and implement alerting on unexpected terminations
  • Implement request logging and analyze incoming queries for abnormal nesting depth
  • Deploy application-level firewalls or middleware to inspect JSON payload structure before reaching Parse Server
  • Set up automated monitoring for Node.js process crashes and memory exhaustion events

Monitoring Recommendations

  • Configure process managers (PM2, systemd) to alert on Parse Server restarts
  • Implement log aggregation to correlate incoming requests with server crash events
  • Monitor request payload sizes and JSON parsing metrics
  • Set up network-level monitoring for repeated requests from the same source followed by service disruption

How to Mitigate CVE-2026-32944

Immediate Actions Required

  • Upgrade Parse Server to version 8.6.45 or 9.6.0-alpha.21 or later immediately
  • After upgrading, configure the requestComplexity.queryDepth server option to limit query nesting depth
  • Review server logs for evidence of exploitation attempts
  • Implement rate limiting on API endpoints as a temporary protective measure

Patch Information

Parse Server has released security patches in versions 8.6.45 and 9.6.0-alpha.21. These patches introduce a new server option called requestComplexity.queryDepth that limits the maximum depth of query condition operator nesting. The option is disabled by default to avoid breaking changes, so administrators must explicitly configure an appropriate depth limit after upgrading.

For detailed patch information, refer to GitHub Pull Request #10202 and GitHub Pull Request #10203. The Parse Server Security Advisory GHSA-9xp9-j92r-p88v provides additional context and guidance.

Workarounds

  • No official workarounds are available according to the vendor advisory
  • Consider placing a reverse proxy or API gateway in front of Parse Server to reject requests with excessive JSON nesting
  • Implement network-level rate limiting to slow potential denial of service attempts
  • Deploy Parse Server behind a load balancer with health checks to quickly route around crashed instances
bash
# Configuration example after upgrading Parse Server
# Add to your Parse Server configuration

# For Parse Server 8.6.45+
# Set queryDepth to an appropriate value for your application
# Lower values provide more protection but may limit legitimate queries

const parseServer = new ParseServer({
  // ... other configuration options
  requestComplexity: {
    queryDepth: 10  // Adjust based on your application's requirements
  }
});

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechParse Server

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-674
  • Technical References
  • GitHub Pull Request #10202

  • GitHub Pull Request #10203
  • Vendor Resources
  • GitHub Security Advisory GHSA-9xp9-j92r-p88v
  • Related CVEs
  • CVE-2026-34573: Parse Server GraphQL DoS Vulnerability

  • CVE-2026-33498: Parse Server DoS Vulnerability

  • CVE-2026-33508: Parse Server LiveQuery DoS Vulnerability

  • CVE-2026-33538: Parse Server DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English