{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T23:18:34.734","vulnerabilities":[{"cve":{"id":"CVE-2026-32770","sourceIdentifier":"security-advisories@github.com","published":"2026-03-18T22:16:25.343","lastModified":"2026-03-19T17:32:00.403","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.19 and 8.6.43, a remote attacker can crash the Parse Server by subscribing to a LiveQuery with an invalid regular expression pattern. The server process terminates when the invalid pattern reaches the regex engine during subscription matching, causing denial of service for all connected clients. The fix in 9.6.0-alpha.19 and 8.6.43 validates regular expression patterns at subscription time, rejecting invalid patterns before they are stored. Additionally, a defense-in-depth try-catch prevents any subscription matching error from crashing the server process. As a workaround, disable LiveQuery if it is not needed."},{"lang":"es","value":"Parse Server es un backend de código abierto que puede ser desplegado en cualquier infraestructura que pueda ejecutar Node.js. Antes de 9.6.0-alpha.19 y 8.6.43, un atacante remoto puede provocar la caída del Parse Server al suscribirse a un LiveQuery con un patrón de expresión regular inválido. El proceso del servidor termina cuando el patrón inválido llega al motor de expresiones regulares durante la coincidencia de suscripción, causando denegación de servicio para todos los clientes conectados. La corrección en 9.6.0-alpha.19 y 8.6.43 valida los patrones de expresiones regulares en el momento de la suscripción, rechazando patrones inválidos antes de que sean almacenados. Además, un try-catch de defensa en profundidad evita que cualquier error de coincidencia de suscripción provoque la caída del proceso del servidor. Como solución alternativa, deshabilite LiveQuery si no es necesario."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-248"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*","versionEndExcluding":"8.6.43","matchCriteriaId":"1815896E-46F3-4C3B-BCFA-6206D9D85D76"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.6.0","matchCriteriaId":"1BAC01F8-0899-482C-8D91-64671BF2859A"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:*","matchCriteriaId":"BBED261F-CA1B-44BC-9C3A-37378590EFEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha10:*:*:*:node.js:*:*","matchCriteriaId":"418338C9-6AEC-492C-ACA4-9B3C0AAE149C"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha11:*:*:*:node.js:*:*","matchCriteriaId":"808B6482-BF8E-407D-8462-E757657CC323"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha12:*:*:*:node.js:*:*","matchCriteriaId":"B84C28F8-AADE-41BB-A0EF-B701AB57DC3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha13:*:*:*:node.js:*:*","matchCriteriaId":"7567BB81-7837-4265-B792-6A9B73CECF93"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha14:*:*:*:node.js:*:*","matchCriteriaId":"0035C6F1-21B9-42D1-BE29-690905F3558C"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha15:*:*:*:node.js:*:*","matchCriteriaId":"623FB30A-0693-4449-80FA-16D36B1BE66C"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha16:*:*:*:node.js:*:*","matchCriteriaId":"9B420167-CD3E-45A7-AD9A-0F83AEC634BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha17:*:*:*:node.js:*:*","matchCriteriaId":"030A8626-DBBD-4BF2-B362-79B44FB1204D"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha18:*:*:*:node.js:*:*","matchCriteriaId":"D38CFCC3-2AA9-4C8E-9064-FE97E6E8C45C"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha2:*:*:*:node.js:*:*","matchCriteriaId":"EDC98AF7-8620-4A25-9BE5-623672599677"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:*","matchCriteriaId":"DF340605-8CC8-4543-9F5D-E8602D258CED"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:*","matchCriteriaId":"A052DFCA-EDCC-43D7-82C7-E5311F6F7687"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:*","matchCriteriaId":"12B11714-B961-4330-B241-FC5AF94FDBE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha6:*:*:*:node.js:*:*","matchCriteriaId":"37A7C42B-4986-4BB6-BB27-0324A9AA1CFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha7:*:*:*:node.js:*:*","matchCriteriaId":"C793834B-64B4-4DE9-BD7D-79B52C30C34E"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha8:*:*:*:node.js:*:*","matchCriteriaId":"7AD455C8-88BE-4A0A-B33D-3A7811FFB753"},{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha9:*:*:*:node.js:*:*","matchCriteriaId":"26C475A2-997C-4C3A-8CB6-04AB3534BBC3"}]}]}],"references":[{"url":"https://github.com/parse-community/parse-server/pull/10197","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/parse-community/parse-server/pull/10199","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-827p-g5x5-h86c","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}