Parse Server LiveQuery subscription query depth bypass
High severity
GitHub Reviewed
Published
Mar 20, 2026
in
parse-community/parse-server
•
Updated Mar 20, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.45
< 8.6.56
Patched versions
9.6.0-alpha.45
8.6.56
Description
Published to the GitHub Advisory Database
Mar 20, 2026
Reviewed
Mar 20, 2026
Last updated
Mar 20, 2026
Impact
Parse Server's LiveQuery component does not enforce the
requestComplexity.queryDepthconfiguration setting when processing WebSocket subscription requests. An attacker can send a subscription with deeply nested logical operators, causing excessive recursion and CPU consumption that degrades or disrupts service availability.Deployments are affected when the LiveQuery WebSocket endpoint is reachable by untrusted clients.
Patches
The fix adds query condition depth validation to the LiveQuery subscription handler, enforcing the same
requestComplexity.queryDepthlimit that already protects REST API queries.Workarounds
There is no known workaround other than upgrading.
References