Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30949: CWE-287: Improper Authentication in parse-community parse-server

0
High
VulnerabilityCVE-2026-30949cvecve-2026-30949cwe-287
Published: Tue Mar 10 2026 (03/10/2026, 20:20:12 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.5 and 8.6.18, the Keycloak authentication adapter does not validate the azp (authorized party) claim of Keycloak access tokens against the configured client-id. A valid access token issued by the same Keycloak realm for a different client application can be used to authenticate as any user on the Parse Server that uses the Keycloak adapter. This enables cross-application account takeover in multi-client Keycloak realms. All Parse Server deployments that use the Keycloak authentication adapter with a Keycloak realm that has multiple client applications are affected. This vulnerability is fixed in 9.5.2-alpha.5 and 8.6.18.

AI-Powered Analysis

AILast updated: 03/10/2026, 20:44:06 UTC

Technical Analysis

Parse Server is an open-source backend platform that supports deployment on any Node.js infrastructure. It integrates with Keycloak for authentication via a dedicated adapter. In versions prior to 9.5.2-alpha.5 and 8.6.18, the Keycloak adapter does not properly validate the 'azp' claim in access tokens. The 'azp' claim identifies the authorized party (client application) for which the token was issued. Without validating this claim against the configured client-id, the adapter accepts tokens issued for other client applications within the same Keycloak realm. This improper authentication (CWE-287) flaw allows an attacker possessing a valid access token for one client application to impersonate any user on the Parse Server that uses the Keycloak adapter, effectively enabling cross-application account takeover. The vulnerability affects all deployments using the Keycloak adapter with multi-client Keycloak realms. Exploitation requires possession of a valid token from the same realm but different client, which could be obtained through other means or compromised clients. The vulnerability impacts confidentiality and integrity by allowing unauthorized access to user accounts without requiring user interaction. The issue is addressed by validating the 'azp' claim against the expected client-id in the patched versions 9.5.2-alpha.5 and 8.6.18.

Potential Impact

This vulnerability can lead to unauthorized access to user accounts across different client applications within the same Keycloak realm, resulting in cross-application account takeover. Attackers can impersonate legitimate users, potentially accessing sensitive data, performing unauthorized actions, or escalating privileges within the affected Parse Server environment. This compromises user confidentiality and integrity, and may lead to data breaches, fraud, or disruption of services. Organizations relying on parse-server with Keycloak in multi-client configurations face significant risk, especially if tokens can be obtained from other client applications. The lack of user interaction and low privilege requirements make exploitation feasible in network-accessible environments. The vulnerability could undermine trust in authentication mechanisms and expose critical backend services to attackers.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to versions 9.5.2-alpha.5 or later, or 8.6.18 or later, where the Keycloak adapter properly validates the 'azp' claim. Until upgrading, administrators should consider restricting Keycloak realms to single-client configurations to reduce risk or implement additional token validation logic at the application layer to verify the 'azp' claim against the expected client-id. Monitoring and logging authentication attempts for anomalies related to token usage across clients can help detect exploitation attempts. Additionally, ensure that access tokens are securely stored and transmitted to prevent token theft. Review Keycloak client configurations to minimize token sharing and enforce strict client isolation. Regularly audit and rotate tokens and credentials to limit the window of exposure. Finally, educate developers and administrators about the risks of multi-client realms without proper token validation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b07f3e2f860ef943b515bb

Added to database: 3/10/2026, 8:29:50 PM

Last enriched: 3/10/2026, 8:44:06 PM

Last updated: 3/10/2026, 9:54:37 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses