Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32242: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in parse-community parse-server

0
Critical
VulnerabilityCVE-2026-32242cvecve-2026-32242cwe-362
Published: Thu Mar 12 2026 (03/12/2026, 18:49:01 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.11 and 8.6.37, Parse Server's built-in OAuth2 auth adapter exports a singleton instance that is reused directly across all OAuth2 provider configurations. Under concurrent authentication requests for different OAuth2 providers, one provider's token validation may execute using another provider's configuration, potentially allowing a token that should be rejected by one provider to be accepted because it is validated against a different provider's policy. Deployments that configure multiple OAuth2 providers via the oauth2: true flag are affected. This vulnerability is fixed in 9.6.0-alpha.11 and 8.6.37.

AI-Powered Analysis

AILast updated: 03/12/2026, 19:14:06 UTC

Technical Analysis

CVE-2026-32242 is a race condition vulnerability classified under CWE-362 affecting the parse-community parse-server, an open-source backend platform running on Node.js. The root cause is the export of a singleton OAuth2 auth adapter instance shared across all OAuth2 provider configurations. When multiple OAuth2 providers are configured concurrently (via the oauth2: true flag), simultaneous authentication requests can cause token validation logic to cross-contaminate between providers. Specifically, a token intended for one OAuth2 provider might be validated against another provider's configuration, which could result in acceptance of tokens that should be rejected. This improper synchronization arises from concurrent execution using shared resources without adequate locking or isolation. The vulnerability affects parse-server versions >= 9.0.0 and < 9.6.0-alpha.11, and versions below 8.6.37. The CVSS 4.0 score is 9.1 (critical), reflecting network attack vector, high attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. The flaw can lead to unauthorized access by bypassing OAuth2 token validation policies. The issue has been fixed in versions 9.6.0-alpha.11 and 8.6.37. No public exploits have been reported yet, but the severity and nature of the flaw make it a high-risk vulnerability for affected deployments.

Potential Impact

This vulnerability can have severe consequences for organizations using parse-server with multiple OAuth2 providers. By allowing tokens to be validated against incorrect provider configurations, attackers could gain unauthorized access to protected resources, impersonate users, or escalate privileges across different OAuth2 domains. This undermines the integrity and confidentiality of authentication processes, potentially exposing sensitive user data and backend services. Since parse-server is used as a backend for various applications, including mobile and web apps, exploitation could lead to widespread unauthorized access and data breaches. The network-exploitable nature and lack of required privileges mean attackers can attempt exploitation remotely without prior access. Organizations relying on OAuth2 for secure authentication are particularly at risk, and the vulnerability could impact compliance with data protection regulations if exploited.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 9.6.0-alpha.11 or later, or 8.6.37 or later, where the race condition has been fixed. Until upgrades are applied, deployments should avoid configuring multiple OAuth2 providers simultaneously with the oauth2: true flag to reduce exposure. Implementing additional application-level synchronization or request serialization around OAuth2 token validation may help mitigate concurrent execution issues temporarily. Security teams should audit OAuth2 configurations and monitor authentication logs for anomalies indicating token validation inconsistencies. Employing runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with custom rules to detect unusual OAuth2 token usage patterns can provide additional defense. Finally, ensure that all dependencies and third-party libraries are kept up to date and conduct regular security testing focused on authentication mechanisms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T14:47:05.685Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b30d502f860ef943de4428

Added to database: 3/12/2026, 7:00:32 PM

Last enriched: 3/12/2026, 7:14:06 PM

Last updated: 3/12/2026, 9:58:31 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses