Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27804: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in parse-community parse-server

0
Critical
VulnerabilityCVE-2026-27804cvecve-2026-27804cwe-327cwe-345
Published: Wed Feb 25 2026 (02/25/2026, 23:48:20 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-27804 is a critical vulnerability in parse-community's parse-server affecting versions prior to 8. 6. 3 and 9. 1. 1-alpha. 4. It allows an unauthenticated attacker to forge Google authentication tokens by exploiting acceptance of the 'alg: none' JWT algorithm, enabling login as any user linked to a Google account without credentials. The flaw arises from trusting the JWT header algorithm and a custom key fetcher that does not properly validate key IDs. The vulnerability impacts all deployments with Google authentication enabled. The fix hardcodes the expected RS256 algorithm and replaces the key fetcher with a more secure implementation that rejects unknown keys.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:25:45 UTC

Technical Analysis

Parse Server is an open-source backend platform that supports Google authentication via JWT tokens. Prior to versions 8.6.3 and 9.1.1-alpha.4, parse-server improperly handled JWT validation by trusting the 'alg' field in the token header. Specifically, it accepted tokens with 'alg: none', which indicates no signature, allowing attackers to forge tokens without cryptographic proof. This flaw stems from using a broken or risky cryptographic algorithm (CWE-327) and insufficient validation of authorization logic (CWE-345). Additionally, the Google adapter used a custom key fetcher that did not reject unknown key IDs, further weakening token validation. An attacker can exploit this by crafting a token with 'alg: none' and any user identifier, gaining unauthorized access as that user. The patch in versions 8.6.3 and 9.1.1-alpha.4 hardcodes the expected RS256 algorithm, ensuring the signature is verified cryptographically, and replaces the key fetcher with 'jwks-rsa', which properly validates keys and rejects unknown key IDs. This vulnerability affects all parse-server deployments with Google authentication enabled and can be exploited remotely without authentication or user interaction. No known exploits are reported in the wild yet, but the high severity and ease of exploitation make it a critical risk.

Potential Impact

The vulnerability allows complete account takeover of any user linked to Google authentication on affected parse-server deployments. Attackers can bypass authentication controls and impersonate legitimate users without credentials, compromising confidentiality and integrity of user data and services. This can lead to unauthorized data access, privilege escalation, data manipulation, and potential lateral movement within affected environments. Organizations relying on parse-server for backend services with Google authentication are at risk of severe breaches, loss of user trust, and regulatory consequences. The vulnerability requires no privileges or user interaction, increasing its threat potential. The widespread use of parse-server in various industries and cloud environments amplifies the global impact. If exploited, attackers could disrupt services, steal sensitive information, or conduct further attacks using compromised accounts.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 8.6.3 or later, or 9.1.1-alpha.4 or later, where the vulnerability is patched. Until upgrades are possible, disable Google authentication to prevent exploitation. Review and audit authentication configurations to ensure no acceptance of 'alg: none' tokens or other insecure algorithms. Implement strict JWT validation by hardcoding expected algorithms and using well-maintained libraries like 'jwks-rsa' for key management. Monitor authentication logs for suspicious token usage or login anomalies. Employ multi-factor authentication (MFA) where possible to add an additional security layer. Conduct penetration testing to verify the effectiveness of fixes. Stay informed about updates from parse-community and related security advisories. Finally, educate developers and administrators about secure JWT handling and cryptographic best practices to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.266Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8fb4b7ef31ef0b6dc8cc

Added to database: 2/26/2026, 12:11:32 AM

Last enriched: 2/26/2026, 12:25:45 AM

Last updated: 2/26/2026, 2:16:37 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats