Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.5 and 8.6.18, the Keycloak authentication adapter does not validate the azp (authorized party) claim of Keycloak access tokens against the configured client-id. A valid access token issued by the same Keycloak realm for a different client application can be used to authenticate as any user on the Parse Server that uses the Keycloak adapter. This enables cross-application account takeover in multi-client Keycloak realms. All Parse Server deployments that use the Keycloak authentication adapter with a Keycloak realm that has multiple client applications are affected. This vulnerability is fixed in 9.5.2-alpha.5 and 8.6.18.
Published: 2026-03-10
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Account Takeover via Keycloak tokens
Action: Immediate Update
AI Analysis

Impact

The vulnerability arises because the Parse Server Keycloak authentication adapter does not verify the azp (authorized party) claim in Keycloak access tokens. A token issued for one client application can be used to authenticate as any user on the affected Parse Server, enabling cross‑application account takeover in multi‑client Keycloak realms. This flaw allows an attacker who obtains a valid token for a different client to impersonate any user on the affected Parse Server, effectively achieving account takeover without any additional privileges or access to the server itself. The weakness is a form of authentication bypass (CWE‑287).

Affected Systems

Parse Server deployments running versions prior to 9.5.2‑alpha.5 or 8.6.18 that use the Keycloak authentication adapter and are connected to a Keycloak realm with multiple client applications are affected. The product is open‑source Parse Server, which can be deployed wherever Node.js runs.

Risk and Exploitability

The CVSS score of 7.6 reflects a high impact and medium exploitability. The EPSS score of less than 1 % indicates that the likelihood of public exploitation is low, and the vulnerability is not currently listed in the KEV catalog. However, an attacker who can acquire a valid Keycloak token for another client can trivially exploit the flaw by presenting the token to the Parse Server, bypassing all user‑level authentication checks. The attack vector is likely remote via signed JWT tokens, and no special privileges are required on the server side. Given the absence of a KEV listing, widespread exploitation may be limited, but the potential for internal account takeover remains significant for organizations using multi‑client Keycloak realms.

Generated by OpenCVE AI on April 17, 2026 at 11:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Parse Server to version 9.5.2‑alpha.5 or newer, or 8.6.18 or newer, which contain the azp claim validation fix.
  • If an immediate upgrade is not possible, restrict the Keycloak realm to a single client application per Parse Server instance or migrate the affected Parse Server to its own Keycloak realm to eliminate cross‑application token reuse.
  • Monitor authentication logs for anomalous azp claims or tokens issued for unexpected clients, and revoke or invalidate tokens that do not match the expected client ID.

Generated by OpenCVE AI on April 17, 2026 at 11:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-48mh-j4p5-7j9v Parse Server missing audience validation in Keycloak authentication adapter
History

Wed, 11 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Parseplatform
Parseplatform parse-server
CPEs cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.5.2:alpha4:*:*:*:node.js:*:*
Vendors & Products Parseplatform
Parseplatform parse-server
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Parse Community
Parse Community parse Server
Vendors & Products Parse Community
Parse Community parse Server

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.5 and 8.6.18, the Keycloak authentication adapter does not validate the azp (authorized party) claim of Keycloak access tokens against the configured client-id. A valid access token issued by the same Keycloak realm for a different client application can be used to authenticate as any user on the Parse Server that uses the Keycloak adapter. This enables cross-application account takeover in multi-client Keycloak realms. All Parse Server deployments that use the Keycloak authentication adapter with a Keycloak realm that has multiple client applications are affected. This vulnerability is fixed in 9.5.2-alpha.5 and 8.6.18.
Title Parse Server is missing audience validation in Keycloak authentication adapter
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Parse Community Parse Server
Parseplatform Parse-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T20:40:49.355Z

Reserved: 2026-03-07T17:34:39.980Z

Link: CVE-2026-30949

cve-icon Vulnrichment

Updated: 2026-03-10T20:40:44.917Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T21:16:47.847

Modified: 2026-03-11T19:40:59.783

Link: CVE-2026-30949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:45:06Z

Weaknesses