<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Parse-Server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/parse-server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 23 May 2026 00:14:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/parse-server/feed.xml" rel="self" type="application/rss+xml"/><item><title>Parse Server Pre-authentication Denial of Service via Client Version Header</title><link>https://feed.craftedsignal.io/briefs/2026-05-parse-server-dos/</link><pubDate>Sat, 23 May 2026 00:14:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-parse-server-dos/</guid><description>A denial-of-service vulnerability, CVE-2026-47138, exists in Parse Server due to inefficient regular expression handling of the client SDK version field in HTTP requests, allowing an unauthenticated attacker to exhaust server resources by sending a crafted request with a malicious `X-Parse-Client-Version` header or `_ClientVersion` body field.</description><content:encoded><![CDATA[<p>Parse Server is susceptible to a denial-of-service (DoS) attack due to inefficient regular expression parsing of the client SDK version. The vulnerability, identified as CVE-2026-47138, affects Parse Server versions prior to 8.6.77 and versions 9.0.0 to 9.9.1-alpha.1. An unauthenticated attacker can exploit this by sending a specially crafted HTTP request to the <code>/parse/*</code> endpoint. This request contains a malicious client SDK version in either the <code>X-Parse-Client-Version</code> header or the <code>_ClientVersion</code> field within the JSON request body. The vulnerability stems from polynomial backtracking in the regex parser, causing excessive CPU consumption. A small number of concurrent requests can saturate a worker, leading to a denial-of-service condition. This issue is pre-authentication, meaning an attacker does not need valid credentials to trigger it.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a publicly accessible Parse Server instance.</li>
<li>The attacker crafts an HTTP request targeting the <code>/parse/*</code> endpoint.</li>
<li>The attacker includes a malicious string in the <code>X-Parse-Client-Version</code> header of the request, designed to trigger polynomial backtracking in the server&rsquo;s regex parser. Alternatively, the <code>_ClientVersion</code> field can be included in the JSON body.</li>
<li>The Parse Server receives the request and attempts to parse the <code>X-Parse-Client-Version</code> header (or <code>_ClientVersion</code> body field) using a vulnerable regular expression.</li>
<li>The crafted malicious input causes the regex parser to enter a computationally expensive backtracking loop.</li>
<li>This loop consumes significant CPU resources on the server&rsquo;s Node.js worker.</li>
<li>Multiple concurrent requests from the attacker exhaust the CPU resources of the available workers.</li>
<li>Legitimate requests to the Parse Server are delayed or dropped, resulting in a denial-of-service condition for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-47138 can lead to a denial-of-service condition, rendering the Parse Server unavailable to legitimate users. This can disrupt applications relying on the server and negatively impact business operations. The vulnerability is easily exploitable by unauthenticated attackers who know a publicly known Parse Application ID, making it a significant threat to production deployments running the default configuration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Parse Server to version 8.6.77 or later, or version 9.9.1-alpha.1 or later to remediate CVE-2026-47138.</li>
<li>Deploy a reverse proxy or Web Application Firewall (WAF) to strip the <code>X-Parse-Client-Version</code> header AND the <code>_ClientVersion</code> field in JSON request bodies on every <code>/parse/*</code> route before forwarding to the server, as mentioned in the workaround.</li>
<li>Implement strict size limits on request headers and bodies via the reverse proxy or WAF, even after patching.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Parse Client Version Header</code> to identify exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>regex-backtracking</category><category>CVE-2026-47138</category></item></channel></rss>