#VU124972 Improper Authentication in Parse Server - CVE-2026-30863

 

#VU124972 Improper Authentication in Parse Server - CVE-2026-30863

Published: April 6, 2026


Vulnerability identifier: #VU124972
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2026-30863
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Parse Server
Software vendor:
Parse Community

Description

The vulnerability allows a remote attacker to authenticate as any user on the target Parse Server.

The vulnerability exists due to improper authentication in the Google, Apple, and Facebook authentication adapters when verifying identity tokens without audience claim validation. A remote attacker can present a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server.

For Google and Apple, exploitation is possible when the server does not configure clientId. For Facebook Limited Login, the JWT verification path does not validate appIds as the audience.


Remediation

Install security update from vendor's website.

External links