CVE-2026-33409
Received Received - Intake
Authentication Bypass in Parse Server via Third-Party Provider ID

Publication date: 2026-03-24

Last updated on: 2026-03-25

Assigner: GitHub, Inc.

Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.52 and 9.6.0-alpha.41, an authentication bypass vulnerability allows an attacker to log in as any user who has linked a third-party authentication provider, without knowing the user's credentials. The attacker only needs to know the user's provider ID to gain full access to their account, including a valid session token. This affects Parse Server deployments where the server option allowExpiredAuthDataToken is set to true. The default value is false. This issue has been patched in versions 8.6.52 and 9.6.0-alpha.41.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 42 associated CPEs
Vendor Product Version / Range
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server From 9.0.0 (inc) to 9.6.0 (exc)
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server 9.6.0
parseplatform parse-server to 8.6.52 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-33409 is an authentication bypass vulnerability in Parse Server that occurs when the server option allowExpiredAuthDataToken is set to true. This vulnerability allows an attacker to log in as any user who has linked a third-party authentication provider without knowing the user's credentials."}, {'type': 'paragraph', 'content': "The attacker only needs to know the user's provider ID and can submit partial authentication data (authData), such as just the provider ID without a valid access token, to bypass proper validation during login."}, {'type': 'paragraph', 'content': 'This happens because the server previously allowed login attempts with incomplete authData when allowExpiredAuthDataToken was enabled, skipping full validation and enabling unauthorized access.'}, {'type': 'paragraph', 'content': 'The vulnerability has been fixed by enforcing full validation of all authData on every login attempt regardless of the allowExpiredAuthDataToken setting, preventing attackers from bypassing authentication with partial data.'}] [1, 2, 3, 4, 5]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can allow an attacker to gain full access to any user account linked to a third-party authentication provider without knowing the user's credentials."}, {'type': 'paragraph', 'content': 'By exploiting the bypass, the attacker can obtain a valid session token and fully impersonate the victim user.'}, {'type': 'paragraph', 'content': 'This leads to unauthorized access, potential data theft, unauthorized modifications, and loss of account integrity.'}, {'type': 'paragraph', 'content': 'The impact is significant because it compromises confidentiality and integrity of user accounts on affected Parse Server deployments where allowExpiredAuthDataToken is enabled.'}] [1, 2, 4, 5]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an authentication bypass in Parse Server when the configuration option allowExpiredAuthDataToken is set to true, allowing login with partial authentication data. Detection involves monitoring login attempts that use partial authData, such as only a provider ID without a valid access token.

To detect exploitation attempts, you can analyze server logs for login requests containing incomplete authData payloads or unusual login patterns where only provider IDs are submitted without full credentials.

Specific commands are not provided in the available resources, but general approaches include:

  • Inspect Parse Server logs for POST /login requests with authData fields missing expected tokens.
  • Use network monitoring tools to capture and analyze authentication traffic for partial authData submissions.
  • Implement custom logging or alerting in Parse Server to flag login attempts where authData is a strict subset of stored data.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, ensure that the Parse Server configuration option allowExpiredAuthDataToken is set to false or removed entirely, as the default is false and enabling it introduces the risk.

Upgrade Parse Server to version 8.6.52, 9.6.0-alpha.41, or later, where the vulnerability has been patched by enforcing full validation of authentication data on every login attempt.

Avoid using partial authData for login and ensure that all authentication providers validate the entire authData payload during login.

  • Set allowExpiredAuthDataToken to false or remove it from your server configuration.
  • Update Parse Server to version 8.6.52, 9.6.0-alpha.41, or newer.
  • Review and monitor authentication logs for suspicious login attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart