CVE-2026-30863

CRITICAL

Parse Server <8.6.10/9.5.0-alpha.11 - Auth Bypass

Title source: llm

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.

Exploits (1)

nomisec SUSPICIOUS
by Worthes · poc
https://github.com/Worthes/CVE-2026-30863-Exploit

Scores

CVSS v3 9.8
EPSS 0.0003
EPSS Percentile 7.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-863 CWE-287
Status published
Products (3)
npm/parse-server 9.0.0-alpha.1 - 9.5.0-alpha.11npm
parseplatform/parse-server 9.5.0 alpha1 (10 CPE variants)
parseplatform/parse-server < 8.6.10
Published Mar 07, 2026
Tracked Since Mar 08, 2026