CVE-2026-30863 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 10, 2026
Parse Server - Authentication Bypass
Overview
Parse Server prior to 8.6.10 and 9.5.0-alpha.11 contains a broken authentication caused by missing audience claim validation in JWT verification for Google, Apple, and Facebook adapters, letting attackers authenticate as any user using JWTs from other applications, exploit requires misconfigured audience option.
Severity & Score
Impact
Attackers can authenticate as any user using JWTs issued for different applications, leading to unauthorized access.
Mitigation
Update to versions 8.6.10 or 9.5.0-alpha.11 or later.
Social Media Activity(1 post)
š“ CVE-2026-30863 - Critical (9.8) Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity ... š https://www.thehackerwire.com/vulnerability/CVE-2026-30863/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-30863
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_authentication
- Status
- confirmed
- EPSS
- 7.1%
- Social Posts
- 1
CWE
- CWE-287
- CWE-863
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H