CVE Vulnerabilities

CVE-2026-30863

Improper Authentication

Published: Mar 07, 2026 | Modified: Mar 10, 2026
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapters audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Parse-serverParseplatform*8.6.10 (excluding)
Parse-serverParseplatform9.0.0 (including)9.5.0 (excluding)
Parse-serverParseplatform9.5.0-alpha1 (including)9.5.0-alpha1 (including)
Parse-serverParseplatform9.5.0-alpha10 (including)9.5.0-alpha10 (including)
Parse-serverParseplatform9.5.0-alpha2 (including)9.5.0-alpha2 (including)
Parse-serverParseplatform9.5.0-alpha3 (including)9.5.0-alpha3 (including)
Parse-serverParseplatform9.5.0-alpha4 (including)9.5.0-alpha4 (including)
Parse-serverParseplatform9.5.0-alpha5 (including)9.5.0-alpha5 (including)
Parse-serverParseplatform9.5.0-alpha6 (including)9.5.0-alpha6 (including)
Parse-serverParseplatform9.5.0-alpha7 (including)9.5.0-alpha7 (including)
Parse-serverParseplatform9.5.0-alpha8 (including)9.5.0-alpha8 (including)
Parse-serverParseplatform9.5.0-alpha9 (including)9.5.0-alpha9 (including)

Potential Mitigations

References