CVE-2026-30863
CRITICALParse Server <8.6.10/9.5.0-alpha.11 - Auth Bypass
Title source: llmDescription
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.
Exploits (1)
Scores
CVSS v3
9.8
EPSS
0.0003
EPSS Percentile
7.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-863
CWE-287
Status
published
Products (3)
npm/parse-server
9.0.0-alpha.1 - 9.5.0-alpha.11npm
parseplatform/parse-server
9.5.0 alpha1 (10 CPE variants)
parseplatform/parse-server
< 8.6.10
Published
Mar 07, 2026
Tracked Since
Mar 08, 2026