Impact
Parse Server lets attackers forge a Google authentication token by setting the JWT header "alg" to "none". This bypasses signature verification, allowing the attacker to log in as any user whose Google account is linked to the Parse Server instance, even without knowing the user’s credentials. The weakness is a classic algorithm confusion flaw, mapped to CWE‑327 and CWE‑345.
Affected Systems
All deployments of parse‑server by the Parse Community that have Google authentication enabled are affected. Versions prior to 8.6.3 and 9.1.1‑alpha.4, regardless of sub‑release, are vulnerable. The issue exists in Node.js environments running Parse Server on any infrastructure that hosts the application.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.3, indicating a high severity impact. The EPSS score is below 1%, suggesting a low but non‑zero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker can exploit it remotely by crafting a JWT with "alg":"none" and sending it to the Parse Server’s authentication endpoint, requiring only network access to the application and no prior credentials.
OpenCVE Enrichment
Github GHSA