Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.9. and 8.6.22, the OAuth2 authentication adapter, when configured without the useridField option, only verifies that a token is active via the provider's token introspection endpoint, but does not verify that the token belongs to the user identified by authData.id. An attacker with any valid OAuth2 token from the same provider can authenticate as any other user. This affects any Parse Server deployment that uses the generic OAuth2 authentication adapter (configured with oauth2: true) without setting the useridField option. This vulnerability is fixed in 9.5.2-alpha.9. and 8.6.22.
References
| Link | Resource |
|---|---|
| https://github.com/parse-community/parse-server/releases/tag/8.6.22 | Product Release Notes |
| https://github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.9 | Product Release Notes |
| https://github.com/parse-community/parse-server/security/advisories/GHSA-fr88-w35c-r596 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
11 Mar 2026, 19:04
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/parse-community/parse-server/releases/tag/8.6.22 - Product, Release Notes | |
| References | () https://github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.9 - Product, Release Notes | |
| References | () https://github.com/parse-community/parse-server/security/advisories/GHSA-fr88-w35c-r596 - Patch, Vendor Advisory | |
| First Time |
Parseplatform
Parseplatform parse-server |
|
| CPE | cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha5:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha6:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha3:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha7:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha4:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha8:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha1:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha2:*:*:*:node.js:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
11 Mar 2026, 13:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 21:16
Updated : 2026-03-11 19:04
NVD link : CVE-2026-30967
Mitre link : CVE-2026-30967
CVE.ORG link : CVE-2026-30967
JSON object : View
Products Affected
parseplatform
- parse-server
CWE
CWE-287
Improper Authentication
