Parse Server has a rate limit bypass via batch request endpoint
Moderate severity
GitHub Reviewed
Published
Mar 10, 2026
in
parse-community/parse-server
•
Updated Mar 11, 2026
Package
Affected versions
>= 9.0.0-alpha.1, < 9.5.2-alpha.10
< 8.6.23
Patched versions
9.5.2-alpha.10
8.6.23
Description
Published by the National Vulnerability Database
Mar 10, 2026
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Last updated
Mar 11, 2026
Impact
Parse Server's rate limiting middleware is applied at the Express middleware layer, but the batch request endpoint (
/batch) processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware including rate limiting. An attacker can bundle multiple requests targeting a rate-limited endpoint into a single batch request to circumvent the configured rate limit.Any Parse Server deployment that relies on the built-in rate limiting feature is affected.
Patches
The fix adds a pre-flight check in the batch request handler that counts the number of sub-requests targeting each rate-limited path and rejects the entire batch request if any path's count exceeds its configured
requestCount.Note that this is a server-level rate limit that counts sub-requests within a single batch request. Requests already consumed in the current time window by previous individual or batch requests are not counted against the batch, so the effective limit may be higher when combining individual and batch requests. For comprehensive rate limiting protection, use a reverse proxy or WAF.
Workarounds
Use a reverse proxy or web application firewall (WAF) to enforce rate limiting before requests reach Parse Server.
References
References