#VU124977 Inefficient regular expression complexity in Parse Server - CVE-2026-30925
Published: April 6, 2026
Parse Server
Parse Community
Description
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to inefficient regular expression complexity in LiveQuery subscription matching when processing a crafted $regex query. A remote attacker can subscribe to a LiveQuery with a crafted regular expression pattern to cause a denial of service.
Only deployments with LiveQuery enabled are vulnerable. Normal REST and GraphQL queries are not affected because their regular expressions are evaluated by the database engine.