CVE-2026-27804 PUBLISHED

Parse Server: Account takeover via JWT algorithm confusion in Google auth adapter

Assigner: GitHub_M
Reserved: 24.02.2026 Published: 25.02.2026 Updated: 25.02.2026

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.3 and 9.1.1-alpha.4, an unauthenticated attacker can forge a Google authentication token with alg: "none" to log in as any user linked to a Google account, without knowing their credentials. All deployments with Google authentication enabled are affected. The fix in versions 8.6.3 and 9.1.1-alpha.4 hardcodes the expected RS256 algorithm instead of trusting the JWT header, and replaces the Google adapter's custom key fetcher with jwks-rsa which rejects unknown key IDs. As a workaround, dsable Google authentication until upgrading is possible.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor parse-community
Product parse-server
Versions
  • Version >= 9.0.0, < 9.3.1-alpha.4 is affected
  • Version < 8.6.3 is affected

References

Problem Types

  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE
  • CWE-345: Insufficient Verification of Data Authenticity CWE