#VU124977 Inefficient regular expression complexity in Parse Server - CVE-2026-30925

 

#VU124977 Inefficient regular expression complexity in Parse Server - CVE-2026-30925

Published: April 6, 2026


Vulnerability identifier: #VU124977
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-30925
CWE-ID: CWE-1333
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Parse Server
Software vendor:
Parse Community

Description

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to inefficient regular expression complexity in LiveQuery subscription matching when processing a crafted $regex query. A remote attacker can subscribe to a LiveQuery with a crafted regular expression pattern to cause a denial of service.

Only deployments with LiveQuery enabled are vulnerable. Normal REST and GraphQL queries are not affected because their regular expressions are evaluated by the database engine.


Remediation

Install security update from vendor's website.

External links