The vulnerability exists in the validateQuery function located in src/Controllers/DatabaseController.js. This function is responsible for validating query objects sent to the Parse Server. The vulnerability is an uncontrolled recursion issue. When the server receives a query with deeply nested logical operators such as $or, $and, or $nor, the validateQuery function calls itself recursively for each level of nesting. Before the patch, there was no limit to this recursion. An unauthenticated attacker could craft a request with a very deep nesting of these operators, causing the Node.js call stack to overflow, which in turn crashes the entire server process, resulting in a Denial of Service (DoS). The patch introduces a queryDepth limit within the requestComplexity server options. The validateQuery function was modified to track the current nesting depth and throw an error if it exceeds the configured limit, thus preventing the crash. The functions DatabaseController.findAndCount, DatabaseController.update, and DatabaseController.destroy are the primary entry points that accept user queries and pass them to the vulnerable validateQuery function.