OAuth2 Authentication Issue in Parse Server by Parse Community
CVE-2026-32242
What is CVE-2026-32242?
Parse Server, a versatile open-source backend solution for Node.js, contains a vulnerability in its OAuth2 authentication mechanism. This flaw arises from the usage of a shared singleton instance across multiple OAuth2 provider configurations, leading to conflicts during concurrent authentication requests. Specifically, the validation of a token intended for one provider may inadvertently occur using the configuration of another provider, thereby risking the acceptance of an invalid token. This issue impacts deployments utilizing the 'oauth2: true' flag with multiple OAuth2 providers configured. Users should upgrade to the latest versions, specifically 9.6.0-alpha.11 or 8.6.37, to mitigate this vulnerability.
Affected Version(s)
parse-server >= 9.0.0 < 9.6.0-alpha.11 < 9.0.0 9.6.0-alpha.11
parse-server < 8.6.37 < 8.6.37
