LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33409

CVE-2026-33409 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: March 25, 2026

Parse Server - Authentication Bypass

Published: March 24, 2026Updated: March 25, 2026Remote Exploitable

Overview

Parse Server < 8.6.52 and < 9.6.0-alpha.41 contains an authentication bypass caused by improper validation of third-party authentication provider IDs when allowExpiredAuthDataToken is true, letting attackers log in as any linked user without credentials.

Severity & Score

Severity: Critical
CVSS Score: 9.1

Impact

Attackers can fully access any linked user account, including obtaining valid session tokens, leading to complete account compromise.

Mitigation

Update to versions 8.6.52 or 9.6.0-alpha.41 or later.

Details

CVE ID
CVE-2026-33409
Severity
Critical
CVSS Score
9.1
Type
broken_authentication
Status
confirmed

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N