Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.13 and 8.6.39, the OAuth2 authentication adapter does not correctly validate app IDs when appidField and appIds are configured. During app ID validation, a malformed value is sent to the token introspection endpoint instead of the user's actual access token. Depending on the introspection endpoint's behavior, this could either cause all OAuth2 logins to fail, or allow authentication from disallowed app contexts if the endpoint returns valid-looking data for the malformed request. Deployments using the OAuth2 adapter with appidField and appIds configured are affected. This vulnerability is fixed in 9.6.0-alpha.13 and 8.6.39.
Published: 2026-03-12
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch Now
AI Analysis

Impact

The vulnerability originates from improper validation of application identifiers when the OAuth2 adapter is configured with appidField and appIds. As noted in the vendor description, a malformed value is sent to the token introspection endpoint instead of the user's actual access token. This could result in either a universal login failure or, if the introspection endpoint returns valid-looking data for the malformed request, unauthorized authentication from disallowed app contexts, effectively bypassing intended access controls. The weakness is reflected in CWE-683, indicating misuse of data that can compromise authentication integrity.

Affected Systems

Affected deployments use Parse Server (parse-community:parse-server) equipped with the OAuth2 adapter and configured with appidField and appIds. Versions prior to 9.6.0-alpha.13 and 8.6.39 are vulnerable, as specified by the release advisory and the CPE list, including multiple alpha releases of 9.6.0 and the 8.6.39 release.

Risk and Exploitability

Given the CVSS score of 6.3, the vulnerability is considered medium severity. The EPSS score is less than 1%, indicating a low probability of exploitation in the general population, and it is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a network-based OAuth2 login attempt where the attacker can provide crafted app ID values. Successful exploitation could allow bypass of authentication controls for the affected application context, potentially granting unauthorized access to protected resources.

Generated by OpenCVE AI on March 18, 2026 at 15:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to Parse Server version 9.6.0-alpha.13 or 8.6.39, where the OAuth2 adapter correctly validates application identifiers.
  • Verify that your OAuth2 configuration does not include appidField and appIds unless necessary, and ensure that the introspection endpoint validates tokens correctly.
  • After patching, perform regression testing of all OAuth2 login flows to confirm that authentication behaves as expected and that no unauthorized contexts are accepted.
  • Monitor application logs for any anomalous authentication attempts, and review configuration changes to ensure app ID validation remains intact.

Generated by OpenCVE AI on March 18, 2026 at 15:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-69xg-f649-w5g2 Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint
History

Fri, 13 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Parseplatform
Parseplatform parse-server
CPEs cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha10:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha11:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha12:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha8:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha9:*:*:*:node.js:*:*
Vendors & Products Parseplatform
Parseplatform parse-server
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Parse Community
Parse Community parse Server
Vendors & Products Parse Community
Parse Community parse Server

Thu, 12 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.13 and 8.6.39, the OAuth2 authentication adapter does not correctly validate app IDs when appidField and appIds are configured. During app ID validation, a malformed value is sent to the token introspection endpoint instead of the user's actual access token. Depending on the introspection endpoint's behavior, this could either cause all OAuth2 logins to fail, or allow authentication from disallowed app contexts if the endpoint returns valid-looking data for the malformed request. Deployments using the OAuth2 adapter with appidField and appIds configured are affected. This vulnerability is fixed in 9.6.0-alpha.13 and 8.6.39.
Title Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint
Weaknesses CWE-683
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Parse Community Parse Server
Parseplatform Parse-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:11:21.212Z

Reserved: 2026-03-11T15:05:48.398Z

Link: CVE-2026-32269

cve-icon Vulnrichment

Updated: 2026-03-13T16:11:17.804Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T20:16:06.187

Modified: 2026-03-13T18:59:01.493

Link: CVE-2026-32269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:54:49Z

Weaknesses