Inefficient regular expression complexity in parse-server - CVE-2026-47138
Published: May 23, 2026
parse-server
Detailed vulnerability description
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to inefficient regular expression complexity in the request-header parser when processing the client SDK version field on /parse/* requests. A remote attacker can send a single specially crafted HTTP request to cause a denial of service.
The issue is reachable before session authentication and before rate limiting, and the X-Parse-Client-Version header or _ClientVersion JSON body field can trigger prolonged synchronous CPU consumption on a Node.js worker. Production deployments running the default configuration are affected.