CVE-2026-30863 - Vulnerability Analysis
N/aLast Updated: March 9, 2026
Parse Server - Authentication Bypass
Overview
Parse Server prior to 8.6.10 and 9.5.0-alpha.11 contains a broken authentication caused by missing audience claim validation in JWT verification for Google, Apple, and Facebook adapters, letting attackers authenticate as any user using JWTs from other applications, exploit requires misconfigured audience option.
Severity & Score
Impact
Attackers can authenticate as any user using JWTs issued for different applications, leading to unauthorized access.
Mitigation
Update to versions 8.6.10 or 9.5.0-alpha.11 or later.
Social Media Activity(1 post)
🚨 CRITICAL: parse-server (<8.6.10, <9.5.0-alpha.11) has CWE-287 improper authentication (CVE-2026-30863). JWT audience check skipped by default; attackers can impersonate users. Patch or set audience now. https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399 #OffSeq #CVE202630863 #ParseServer #infosec
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-30863
- Severity
- N/a
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 6.6%
- Social Posts
- 1
CWE
- CWE-287
CVSS Metrics
N/A