Parse Server: LiveQuery subscription with invalid regular expression crashes server
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.19 and 8.6.43, a remote attacker can crash the Parse Server by subscribing to a LiveQuery with an invalid regular expression pattern. The server process terminates when the invalid pattern reaches the regex engine during subscription matching, causing denial of service for all connected clients. The fix in 9.6.0-alpha.19 and 8.6.43 validates regular expression patterns at subscription time, rejecting invalid patterns before they are stored. Additionally, a defense-in-depth try-catch prevents any subscription matching error from crashing the server process. As a workaround, disable LiveQuery if it is not needed.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | >= 9.0.0, < 9.6.0-alpha.19 | 9.6.0-alpha.19 |
parse-servernpm | < 8.6.43 | 8.6.43 |
Affected products
1- Range: >= 9.0.0, < 9.6.0-alpha.19
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-827p-g5x5-h86cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32770ghsaADVISORY
- github.com/parse-community/parse-server/pull/10197ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/pull/10199ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-827p-g5x5-h86cghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.