#VU125001 Race condition in Parse Server - CVE-2026-32242

 

#VU125001 Race condition in Parse Server - CVE-2026-32242

Published: April 6, 2026


Vulnerability identifier: #VU125001
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-32242
CWE-ID: CWE-362
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Parse Server
Software vendor:
Parse Community

Description

The vulnerability allows a remote attacker to bypass OAuth2 token validation and gain unauthorized access.

The vulnerability exists due to a race condition in the built-in OAuth2 auth adapter when handling concurrent authentication requests for different OAuth2 providers. A remote attacker can send concurrent authentication requests to cause one provider's token validation to use another provider's configuration to bypass OAuth2 token validation and gain unauthorized access.

Only deployments that configure multiple OAuth2 providers via the oauth2: true flag are vulnerable.


Remediation

Install security update from vendor's website.

External links