CVE Vulnerabilities

CVE-2026-30972

Improper Control of Interaction Frequency

Published: Mar 10, 2026 | Modified: Mar 11, 2026
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior o 9.5.2-alpha.10 and 8.6.23, Parse Servers rate limiting middleware is applied at the Express middleware layer, but the batch request endpoint (/batch) processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware including rate limiting. An attacker can bundle multiple requests targeting a rate-limited endpoint into a single batch request to circumvent the configured rate limit. Any Parse Server deployment that relies on the built-in rate limiting feature is affected. This vulnerability is fixed in 9.5.2-alpha.10 and 8.6.23.

Weakness

The product does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests.

Affected Software

NameVendorStart VersionEnd Version
Parse-serverParseplatform*8.6.23 (excluding)
Parse-serverParseplatform9.0.0 (including)9.5.2 (excluding)
Parse-serverParseplatform9.5.2-alpha1 (including)9.5.2-alpha1 (including)
Parse-serverParseplatform9.5.2-alpha2 (including)9.5.2-alpha2 (including)
Parse-serverParseplatform9.5.2-alpha3 (including)9.5.2-alpha3 (including)
Parse-serverParseplatform9.5.2-alpha4 (including)9.5.2-alpha4 (including)
Parse-serverParseplatform9.5.2-alpha5 (including)9.5.2-alpha5 (including)
Parse-serverParseplatform9.5.2-alpha6 (including)9.5.2-alpha6 (including)
Parse-serverParseplatform9.5.2-alpha7 (including)9.5.2-alpha7 (including)
Parse-serverParseplatform9.5.2-alpha8 (including)9.5.2-alpha8 (including)
Parse-serverParseplatform9.5.2-alpha9 (including)9.5.2-alpha9 (including)

References