CVE-2026-30949

HIGH WAF: Low
CVSS 8.8 Published: 2026-03-10
CWE-287

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.5 and 8.6.18, the Keycloak authentication adapter does not validate the azp (authorized party) claim of Keycloak access tokens against the configured client-id. A valid access token issued by the same Keycloak realm for a different client application can be used to authenticate as any user on the Parse Server that uses the Keycloak adapter. This enables cross-application account takeover in multi-client Keycloak realms. All Parse Server deployments that use the Keycloak authentication adapter with a Keycloak realm that has multiple client applications are affected. This vulnerability is fixed in 9.5.2-alpha.5 and 8.6.18.

WAF Coverage Analysis

Improper Authentication Low WAF Coverage

OWASP: A07:2021 Identification and Authentication Failures

Affected Software

VendorProductVersion
parseplatformparse-serverup to 8.6.18
parseplatformparse-server9.0.0 - 9.5.2
parseplatformparse-server9.5.2
parseplatformparse-server9.5.2
parseplatformparse-server9.5.2
parseplatformparse-server9.5.2

References

Back to CVE Database