LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-30863

CVE-2026-30863 - Vulnerability Analysis

N/a

Last Updated: March 9, 2026

Parse Server - Authentication Bypass

Published: March 7, 2026Updated: March 9, 2026PoC Available

Overview

Parse Server prior to 8.6.10 and 9.5.0-alpha.11 contains a broken authentication caused by missing audience claim validation in JWT verification for Google, Apple, and Facebook adapters, letting attackers authenticate as any user using JWTs from other applications, exploit requires misconfigured audience option.

Severity & Score

Severity: N/a
EPSS Score: 6.6%(Probability of exploitation in next 30 days)

Impact

Attackers can authenticate as any user using JWTs issued for different applications, leading to unauthorized access.

Mitigation

Update to versions 8.6.10 or 9.5.0-alpha.11 or later.

Social Media Activity(1 post)

Offensive Sequence
Offensive Sequence
@offseq
Mar 8, 2026

🚨 CRITICAL: parse-server (<8.6.10, <9.5.0-alpha.11) has CWE-287 improper authentication (CVE-2026-30863). JWT audience check skipped by default; attackers can impersonate users. Patch or set audience now. https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399 #OffSeq #CVE202630863 #ParseServer #infosec

View original post

Details

CVE ID
CVE-2026-30863
Severity
N/a
Type
broken_authentication
Status
unconfirmed
EPSS
6.6%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

N/A

EPSS Score

6.6%Probability of exploitation in the next 30 days