Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33042: CWE-287: Improper Authentication in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-33042cvecve-2026-33042cwe-287
Published: Wed Mar 18 2026 (03/18/2026, 21:54:05 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.29 and 8.6.49, a user can sign up without providing credentials by sending an empty `authData` object, bypassing the username and password requirement. This allows the creation of authenticated sessions without proper credentials, even when anonymous users are disabled. The fix in 9.6.0-alpha.29 and 8.6.49 ensures that empty or non-actionable `authData` is treated the same as absent `authData` for the purpose of credential validation on new user creation. Username and password are now required when no valid auth provider data is present. As a workaround, use a Cloud Code `beforeSave` trigger on the `_User` class to reject signups where `authData` is empty and no username/password is provided.

AI-Powered Analysis

AILast updated: 03/18/2026, 22:28:10 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js and supports user authentication via username/password or third-party auth providers. In affected versions prior to 9.6.0-alpha.29 and 8.6.49, the server improperly handled the authData field during user signup. Specifically, if an attacker submitted an empty authData object, the server bypassed the normal username and password validation, allowing creation of authenticated sessions without valid credentials. This flaw exists even when anonymous user signups are disabled, effectively allowing unauthorized account creation and session establishment. The root cause is that empty or non-actionable authData was treated as if valid auth provider data was present, circumventing credential checks. The fix introduced in the patched versions treats empty authData the same as absent authData, requiring username and password when no valid auth provider data exists. As a mitigation, developers can implement a Cloud Code beforeSave trigger on the _User class to reject signups with empty authData and missing username/password. This vulnerability is classified under CWE-287 (Improper Authentication) and has a CVSS 4.0 base score of 6.9, indicating medium severity. No public exploits have been reported yet, but the flaw allows unauthenticated remote attackers to bypass authentication controls and create accounts.

Potential Impact

The vulnerability allows attackers to bypass authentication controls and create authenticated user sessions without valid credentials. This can lead to unauthorized access to application resources, data exposure, and potential privilege escalation if the attacker leverages the created accounts for further attacks. Organizations relying on parse-server for backend user management may face data integrity and confidentiality risks, as unauthorized users could access or manipulate data intended for legitimate users. The impact is amplified in environments where anonymous user signups are disabled, as the vulnerability negates this security control. Although the vulnerability does not directly enable remote code execution or system compromise, unauthorized account creation undermines trust in the authentication mechanism and can facilitate subsequent attacks such as data exfiltration, fraud, or lateral movement within the application ecosystem.

Mitigation Recommendations

The primary mitigation is to upgrade parse-server to version 9.6.0-alpha.29 or later, or 8.6.49 or later, where the authentication logic correctly enforces username and password requirements when authData is empty or invalid. Until upgrades can be applied, implement a Cloud Code beforeSave trigger on the _User class to reject any signup requests where authData is empty and no username/password is provided. This custom validation ensures that unauthorized account creation is blocked at the application layer. Additionally, review and tighten backend access controls and monitor user creation logs for suspicious activity indicative of exploitation attempts. Employ rate limiting and anomaly detection on signup endpoints to reduce automated abuse. Finally, ensure that anonymous user signups are explicitly disabled if not required, and verify that all authentication flows are tested for proper credential validation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.210Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2382771bdb1749c98982

Added to database: 3/18/2026, 10:13:22 PM

Last enriched: 3/18/2026, 10:28:10 PM

Last updated: 3/19/2026, 5:05:07 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses