CVE-2026-30972

HIGH

Parse Server <9.5.2-alpha.10/8.6.23 - Auth Bypass

Title source: llm
STIX 2.1

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior o 9.5.2-alpha.10 and 8.6.23, Parse Server's rate limiting middleware is applied at the Express middleware layer, but the batch request endpoint (/batch) processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware including rate limiting. An attacker can bundle multiple requests targeting a rate-limited endpoint into a single batch request to circumvent the configured rate limit. Any Parse Server deployment that relies on the built-in rate limiting feature is affected. This vulnerability is fixed in 9.5.2-alpha.10 and 8.6.23.

Scores

CVSS v3 7.5
EPSS 0.0006
EPSS Percentile 18.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-799
Status published
Products (3)
npm/parse-server 9.0.0-alpha.1 - 9.5.2-alpha.10npm
parseplatform/parse-server 9.5.2 alpha1 (9 CPE variants)
parseplatform/parse-server < 8.6.23
Published Mar 10, 2026
Tracked Since Mar 11, 2026