LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32248

CVE-2026-32248 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 13, 2026

Parse Server - Authentication Bypass

Published: March 12, 2026Updated: March 13, 2026Remote Exploitable

Overview

Parse Server < 9.6.0-alpha.12 and < 8.6.38 contains an authentication bypass caused by crafted login requests triggering pattern-matching queries instead of exact-match lookups, letting unauthenticated attackers take over user accounts with vulnerable authentication providers, exploit requires anonymous authentication enabled.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 5.6%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can take over user accounts and obtain valid session tokens, leading to full account compromise.

Mitigation

Update to version 9.6.0-alpha.12, 8.6.38 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 13, 2026

šŸ”“ CVE-2026-32248 - Critical (9.8) Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.12 and 8.6.38, an unauthenticated attacker can take over any user account that was created with an authentication provider... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32248/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32248
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
confirmed
EPSS
5.6%
Social Posts
1

CWE

  • CWE-943

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

5.6%Probability of exploitation in the next 30 days