Cyber Posture

CVE-2026-30863

Critical

Published: 07 March 2026

Published
07 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30863 is a critical-severity Improper Authentication (CWE-287) vulnerability in Parseplatform Parse-Server. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and IA-13 (Identity Providers and Authorization Servers).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the specific flaw in Parse Server's authentication adapters that skips JWT audience claim validation when configuration options are unset.

prevent

Enforces configuration settings requiring the audience configuration options (clientId for Google/Apple, appIds for Facebook) to be explicitly set, preventing the silent skip of JWT audience validation.

prevent

Requires proper management and security requirements for external identity providers like Google, Apple, and Facebook, including validation of JWT claims such as audience to ensure tokens are application-specific.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1550.001 Application Access Token Lateral Movement
Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.
Why these techniques?

CVE enables remote exploitation of public-facing Parse Server auth bypass (T1190) via misuse of cross-app JWT access tokens (T1550.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the…

more

adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.

Deeper analysisAI

CVE-2026-30863 is a critical authentication vulnerability in Parse Server, an open source backend deployable on any Node.js-compatible infrastructure. In versions prior to 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters perform JWT verification on identity tokens but silently skip validation of the audience claim when the relevant configuration option is unset—specifically, clientId for Google and Apple, or appIds for Facebook. This flaw, scored at CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and linked to CWEs 287 (Improper Authentication) and 863 (Incorrect Authorization), allows attackers to bypass intended application-specific restrictions.

A remote, unauthenticated attacker can exploit this vulnerability by obtaining a validly signed JWT issued for a different application via the same provider (Google, Apple, or Facebook) and submitting it to the target Parse Server. Successful exploitation enables the attacker to authenticate as any user on the server, granting unauthorized access to that user's data, privileges, and actions, with potential for complete compromise of confidentiality, integrity, and availability.

The vulnerability has been patched in Parse Server versions 8.6.10 and 9.5.0-alpha.11. Additional mitigation details and patch information are available in the GitHub security advisory at https://github.com/parse-community/parse-server/security/advisories/GHSA-x6fw-778m-wr9v.

Details

CWE(s)

Affected Products

parseplatform
parse-server
9.5.0 · ≤ 8.6.10 · 9.0.0 — 9.5.0

CVEs Like This One

CVE-2026-30967Same product: Parseplatform Parse-Server
CVE-2026-34532Same product: Parseplatform Parse-Server
CVE-2026-30947Same product: Parseplatform Parse-Server
CVE-2026-33409Same product: Parseplatform Parse-Server
CVE-2026-30949Same product: Parseplatform Parse-Server
CVE-2026-30965Same product: Parseplatform Parse-Server
CVE-2026-29182Same product: Parseplatform Parse-Server
CVE-2026-32878Same product: Parseplatform Parse-Server
CVE-2026-32594Same product: Parseplatform Parse-Server
CVE-2026-34784Same product: Parseplatform Parse-Server

References