Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33042: CWE-287: Improper Authentication in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-33042cvecve-2026-33042cwe-287
Published: Wed Mar 18 2026 (03/18/2026, 21:54:05 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.29 and 8.6.49, a user can sign up without providing credentials by sending an empty `authData` object, bypassing the username and password requirement. This allows the creation of authenticated sessions without proper credentials, even when anonymous users are disabled. The fix in 9.6.0-alpha.29 and 8.6.49 ensures that empty or non-actionable `authData` is treated the same as absent `authData` for the purpose of credential validation on new user creation. Username and password are now required when no valid auth provider data is present. As a workaround, use a Cloud Code `beforeSave` trigger on the `_User` class to reject signups where `authData` is empty and no username/password is provided.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:05:52 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js and supports user authentication via username/password or third-party auth providers. Versions before 9.6.0-alpha.29 and 8.6.49 contain a critical flaw in the authentication logic where an attacker can bypass credential requirements by submitting an empty authData object during user signup. This bypasses the intended authentication checks, allowing creation of authenticated sessions without valid credentials, even if anonymous user signups are disabled. The root cause is improper handling of empty or non-actionable authData, which was previously accepted as valid authentication data. The fix introduced in 9.6.0-alpha.29 and 8.6.49 treats empty authData the same as absent authData, enforcing that either valid third-party auth provider data or username/password credentials must be present to create a user. As a mitigation, developers can implement a Cloud Code beforeSave trigger on the _User class to reject signups with empty authData and missing username/password, effectively blocking unauthorized user creation. This vulnerability is tracked as CWE-287 (Improper Authentication) and has a CVSS 4.0 score of 6.9, indicating medium severity. No public exploits have been reported yet, but the vulnerability is exploitable remotely without authentication or user interaction, posing a risk to any deployment running affected versions.

Potential Impact

The vulnerability allows attackers to create authenticated user sessions without valid credentials, effectively bypassing authentication controls. This can lead to unauthorized access to application resources, data leakage, and potential privilege escalation depending on the application's access control implementation. Organizations relying on parse-server for backend user management may face unauthorized account creation, which could be leveraged for further attacks such as data exfiltration, impersonation, or abuse of application functionality. Since the flaw bypasses anonymous user restrictions, it undermines security policies intended to prevent unauthorized access. The impact is particularly significant for applications handling sensitive user data or critical business functions. Although no known exploits exist currently, the ease of exploitation and network accessibility make this a credible threat. The medium CVSS score reflects limited impact on confidentiality and availability but a clear integrity risk due to improper authentication.

Mitigation Recommendations

The primary mitigation is to upgrade parse-server to version 9.6.0-alpha.29 or later, or 8.6.49 or later, where the authentication logic properly validates authData. If immediate upgrade is not feasible, implement a Cloud Code beforeSave trigger on the _User class to reject any signup requests where authData is empty and no username/password is provided. This custom validation ensures that unauthorized user creation attempts are blocked. Additionally, review and tighten access control policies and monitor user creation logs for suspicious activity. Employ rate limiting and anomaly detection to identify potential abuse. Regularly audit parse-server configurations to ensure anonymous user signups are disabled if not required. Finally, keep parse-server and dependencies up to date and subscribe to vendor advisories for timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.210Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2382771bdb1749c98982

Added to database: 3/18/2026, 10:13:22 PM

Last enriched: 3/26/2026, 1:05:52 AM

Last updated: 5/3/2026, 1:07:39 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses