Parse Server is an open-source backend framework that allows developers to build applications with a robust server-side infrastructure. It provides features such as data storage, user authentication, and real-time notifications.
Versions 9.0.0 to 9.6.0-alpha.40 and all versions below 8.6.52 are affected by this vulnerability.
The impact in these scenario where authentication bypass vulnerability allows an attacker to log in as any user who has linked a third-party authentication provider, without knowing the user’s credentials. The attacker only needs to know the user’s provider ID to gain full access to their account, including a valid session token.
This affects Parse Server deployments where the server option allowExpiredAuthDataToken is set to true. The default value is false.
The authentication bypass vulnerability in Parse Server poses a significant risk to user accounts linked to third-party authentication providers. It is crucial to update to the patched versions or implement the recommended workaround to mitigate this risk.
Authentication is one of those things every product needs, but few teams want to spend time rebuilding from scratch. In today’s digital landscape, the security and reliability of user authentication methods play a crucial role in safeguarding sensitive information and ensuring a seamless user experience.
How the Parse Serve Vulnerability work as exploit?
/users) endpoint.Patching:
authData.Parse.Cloud.beforeSave(Parse.User, (request) => {const authData = request.object.get(‘authData’);const hasUsername = request.object.get(‘username’);const hasPassword = request.object.get(‘password’);// If authData is an empty object and no username/password, block the signupif (authData && typeof authData === ‘object’ && Object.keys(authData).length === 0) {if (!hasUsername || !hasPassword) {throw new Parse.Error(Parse.Error.OPERATION_FORBIDDEN, ‘Signup requires credentials.’);}}});Successful exploitation allows an unauthenticated, remote attacker to create a valid user session on the Parse Server. This leads to unauthorized access to the application’s backend, potentially allowing the attacker to view, create, modify, or delete data that the newly created user has permissions for, compromising the confidentiality and integrity of the application.
Parse Server, Authentication Bypass, CVE-2025- (Moderate) – DailyCVE
Recent Comments