CVE-2026-30863 PUBLISHED

Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters

Assigner: GitHub_M
Reserved: 05.03.2026 Published: 07.03.2026 Updated: 07.03.2026

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor parse-community
Product parse-server
Versions
  • Version < 8.6.10 is affected
  • Version < 9.5.0-alpha.11 is affected

References

Problem Types

  • CWE-287: Improper Authentication CWE