The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-34573

CVE-2026-34573: Parse Server GraphQL DoS Vulnerability

CVE-2026-34573 is a denial-of-service flaw in Parse Server's GraphQL query complexity validator that allows attackers to block the Node.js event loop. This article covers the technical details, affected versions, and mitigation.

Published: April 2, 2026

CVE-2026-34573 Overview

Parse Server, an open source backend that can be deployed to any infrastructure running Node.js, contains a denial-of-service vulnerability in its GraphQL query complexity validator. Prior to versions 8.6.68 and 9.7.0-alpha.12, the complexity validator can be exploited by sending crafted queries with binary fan-out fragment spreads. This algorithmic complexity attack allows a single unauthenticated request to block the Node.js event loop for seconds, effectively denying service to all concurrent users.

Critical Impact

A single unauthenticated attacker can cause complete service disruption for all Parse Server users by exploiting exponential fragment traversal in the GraphQL complexity validator.

Affected Products

  • Parse Server versions prior to 8.6.68
  • Parse Server versions 9.7.0-alpha1 through 9.7.0-alpha11
  • Deployments with requestComplexity.graphQLDepth or requestComplexity.graphQLFields configuration options enabled

Discovery Timeline

  • March 31, 2026 - CVE-2026-34573 published to NVD
  • April 2, 2026 - Last updated in NVD database

Technical Details for CVE-2026-34573

Vulnerability Analysis

This vulnerability is classified under CWE-407 (Inefficient Algorithmic Complexity). The GraphQL complexity validator in Parse Server fails to properly handle binary fan-out fragment spreads, leading to exponential traversal behavior. When processing nested fragment references, the validator traverses fragments without caching results, causing the computational cost to grow exponentially with query depth.

The attack is particularly severe because it requires no authentication and operates at the application layer. A malicious actor can craft a GraphQL query that appears relatively simple but triggers an exponential number of operations during complexity validation. This blocks the single-threaded Node.js event loop, preventing the server from processing any other requests during the attack.

The vulnerability specifically affects deployments that have enabled the requestComplexity.graphQLDepth or requestComplexity.graphQLFields configuration options, as these trigger the vulnerable validation code path.

Root Cause

The root cause lies in the calculateQueryComplexity function in src/GraphQL/helpers/queryComplexity.js. The original implementation recursively traverses fragment spreads without caching the results of previously computed fragments. When a query contains fragments that reference other fragments in a fan-out pattern, each fragment is re-evaluated multiple times, leading to exponential time complexity.

Attack Vector

The attack is network-accessible and requires no authentication. An attacker constructs a GraphQL query containing multiple nested fragment spreads that create exponential traversal paths. The query complexity validator attempts to calculate the total complexity before execution, but the exponential fragment resolution consumes CPU resources and blocks the event loop. Since Node.js is single-threaded, this prevents all other request processing until the computation completes.

javascript
// Security patch from src/GraphQL/helpers/queryComplexity.js
// Source: https://github.com/parse-community/parse-server/commit/ea15412795f34594cc8a674fe858d445675e0295

 import { GraphQLError } from 'graphql';
 import logger from '../../logger';
 
-function calculateQueryComplexity(operation, fragments) {
+function calculateQueryComplexity(operation, fragments, limits = {}) {
   let maxDepth = 0;
   let totalFields = 0;
+  const fragmentCache = new Map();
+  const { maxDepth: allowedMaxDepth, maxFields: allowedMaxFields } = limits;
 
   function visitSelectionSet(selectionSet, depth, visitedFragments) {
     if (!selectionSet) {
       return;
     }
+    if (
+      (allowedMaxFields !== undefined && allowedMaxFields !== -1 && totalFields > allowedMaxFields) ||
+      (allowedMaxDepth !== undefined && allowedMaxDepth !== -1 && maxDepth > allowedMaxDepth)
+    ) {
+      return;
+    }
     for (const selection of selectionSet.selections) {
       if (selection.kind === 'Field') {
         totalFields++;

The patch introduces a fragmentCache Map to store computed fragment complexity results, preventing redundant traversals. Additionally, it adds early termination checks that stop traversal once configured limits are exceeded, preventing unbounded computation.

Detection Methods for CVE-2026-34573

Indicators of Compromise

  • Abnormally high CPU utilization on Parse Server instances without corresponding increase in legitimate traffic
  • GraphQL endpoint response times increasing dramatically or timing out
  • Server logs showing extended request processing times for GraphQL queries
  • Event loop lag metrics spiking on Node.js monitoring dashboards

Detection Strategies

  • Monitor GraphQL query complexity and depth at the application firewall or API gateway level
  • Implement request timeout monitoring that alerts on queries exceeding expected processing times
  • Deploy application performance monitoring (APM) to detect Node.js event loop blocking events
  • Analyze incoming GraphQL queries for unusual fragment nesting patterns or repeated fragment references

Monitoring Recommendations

  • Configure alerting for CPU utilization spikes exceeding baseline thresholds on Parse Server hosts
  • Implement rate limiting on GraphQL endpoints to prevent rapid-fire attack attempts
  • Enable detailed request logging for GraphQL operations to support forensic analysis
  • Monitor for patterns of queries with excessive fragment definitions relative to actual data requested

How to Mitigate CVE-2026-34573

Immediate Actions Required

  • Upgrade Parse Server to version 8.6.68 or later for stable branch deployments
  • Upgrade Parse Server to version 9.7.0-alpha.12 or later for alpha branch deployments
  • Temporarily disable the requestComplexity.graphQLDepth and requestComplexity.graphQLFields configuration options if upgrade cannot be performed immediately
  • Implement network-level rate limiting on GraphQL endpoints as an additional defense layer

Patch Information

Parseplatform has released security patches addressing this vulnerability. The fixes are available in versions 8.6.68 and 9.7.0-alpha.12. The patches introduce fragment caching to prevent exponential traversal and add early termination when configured complexity limits are exceeded. For detailed patch information, see GitHub Pull Request #10344, GitHub Pull Request #10345, and the GitHub Security Advisory GHSA-mfj6-6p54-m98c.

Workarounds

  • Disable GraphQL complexity validation by removing requestComplexity.graphQLDepth and requestComplexity.graphQLFields from your Parse Server configuration until patched versions can be deployed
  • Deploy a reverse proxy or WAF with GraphQL query inspection capabilities to filter potentially malicious queries
  • Implement application-level timeouts that terminate long-running GraphQL validation processes
bash
# Configuration example - Disable complexity validation temporarily
# In your Parse Server initialization, remove or comment out these options:

# parseServerOptions = {
#   // TEMPORARILY DISABLED - CVE-2026-34573
#   // requestComplexity: {
#   //   graphQLDepth: 10,
#   //   graphQLFields: 100
#   // }
# }

# After upgrading to 8.6.68+ or 9.7.0-alpha.12+, re-enable with:
parseServerOptions = {
  requestComplexity: {
    graphQLDepth: 10,
    graphQLFields: 100
  }
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechParse Server

  • SeverityHIGH

  • CVSS Score8.2

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-407
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Commit Update

  • GitHub Pull Request #10344

  • GitHub Pull Request #10345

  • GitHub Security Advisory GHSA-mfj6-6p54-m98c
  • Related CVEs
  • CVE-2026-33498: Parse Server DoS Vulnerability

  • CVE-2026-33508: Parse Server LiveQuery DoS Vulnerability

  • CVE-2026-33538: Parse Server DOS Vulnerability

  • CVE-2026-32770: Parse Server LiveQuery DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English