SB2026040778 - Inefficient regular expression complexity in Parse Server



SB2026040778 - Inefficient regular expression complexity in Parse Server

Published: April 7, 2026

Security Bulletin ID SB2026040778
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Inefficient regular expression complexity (CVE-ID: CVE-2026-30925)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to inefficient regular expression complexity in LiveQuery subscription matching when processing a crafted $regex query. A remote attacker can subscribe to a LiveQuery with a crafted regular expression pattern to cause a denial of service.

Only deployments with LiveQuery enabled are vulnerable. Normal REST and GraphQL queries are not affected because their regular expressions are evaluated by the database engine.


Remediation

Install update from vendor's website.