Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27804: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in parse-community parse-server

0
Critical
VulnerabilityCVE-2026-27804cvecve-2026-27804cwe-327cwe-345
Published: Wed Feb 25 2026 (02/25/2026, 23:48:20 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.3 and 9.1.1-alpha.4, an unauthenticated attacker can forge a Google authentication token with `alg: "none"` to log in as any user linked to a Google account, without knowing their credentials. All deployments with Google authentication enabled are affected. The fix in versions 8.6.3 and 9.1.1-alpha.4 hardcodes the expected `RS256` algorithm instead of trusting the JWT header, and replaces the Google adapter's custom key fetcher with `jwks-rsa` which rejects unknown key IDs. As a workaround, dsable Google authentication until upgrading is possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:08:09 UTC

Technical Analysis

Parse Server is an open-source backend platform that supports Google authentication via JSON Web Tokens (JWT). Prior to versions 8.6.3 and 9.1.1-alpha.4, parse-server improperly handled JWT validation by trusting the 'alg' field in the JWT header. Specifically, it accepted tokens with 'alg: none', a known insecure algorithm that indicates no signature verification. This allowed attackers to craft forged Google authentication tokens that bypass signature verification and impersonate any user linked to a Google account. The vulnerability stems from CWE-327 (use of a broken or risky cryptographic algorithm) and CWE-345 (insufficient verification of data authenticity). Additionally, the Google adapter used a custom key fetcher that did not reject unknown key IDs, further weakening token validation. The fix hardcodes the expected RS256 algorithm, ensuring signature verification is enforced, and replaces the key fetcher with the 'jwks-rsa' library, which properly validates key IDs against Google's JSON Web Key Set. This vulnerability affects all parse-server deployments with Google authentication enabled running versions >=9.0.0 and <9.3.1-alpha.4, or versions below 8.6.3. Exploitation requires no authentication or user interaction, making it highly dangerous. No known exploits in the wild have been reported yet, but the critical severity and ease of exploitation make timely patching essential.

Potential Impact

The vulnerability allows complete account takeover of any user linked to a Google account on affected parse-server deployments. Attackers can bypass authentication controls without credentials, compromising confidentiality by accessing sensitive user data and integrity by performing unauthorized actions on behalf of users. This can lead to data breaches, unauthorized transactions, privilege escalation, and lateral movement within affected environments. Since parse-server is used as a backend for various applications, the impact extends to all services relying on it for authentication. The lack of authentication or user interaction required for exploitation increases the risk of automated attacks and mass compromise. Organizations using Google authentication with parse-server are at significant risk of identity theft, data leakage, and service disruption until patched.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 8.6.3 or later, or 9.1.1-alpha.4 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, disable Google authentication temporarily to prevent exploitation. Review authentication logs for suspicious login attempts or anomalies indicative of token forgery. Implement additional monitoring and alerting on authentication events. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block JWT tokens with 'alg: none' or malformed tokens. Conduct a thorough audit of user accounts linked to Google authentication for unauthorized access. Educate developers and administrators on secure JWT handling and the risks of trusting JWT header algorithms. Finally, ensure that third-party libraries handling JWT validation are up to date and configured to reject insecure algorithms and unknown key IDs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.266Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8fb4b7ef31ef0b6dc8cc

Added to database: 2/26/2026, 12:11:32 AM

Last enriched: 3/5/2026, 11:08:09 AM

Last updated: 4/12/2026, 1:46:35 AM

Views: 235

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses