Authentication Bypass in Parse Server by Parse Community
CVE-2026-33042

6.9MEDIUM

Key Information:

Vendor
CVE Published:
18 March 2026

What is CVE-2026-33042?

Parse Server includes a considerable security issue that allows unauthorized user sign-up. Versions before 9.6.0-alpha.29 and 8.6.49 allow users to bypass authentication by providing an empty authData object. This flaw enables the creation of authenticated sessions without proper credentials, even when the settings prevent anonymous user access. Fortunately, updates have been made to the platform in the aforementioned versions to enforce the requirement of providing valid username and password details during account creation. For additional protection and a temporary redress before updating, developers can implement a Cloud Code beforeSave trigger on the _User class to reject invalid sign-up attempts.

Affected Version(s)

parse-server >= 9.0.0, < 9.6.0-alpha.29 < 9.0.0, 9.6.0-alpha.29

parse-server < 8.6.49 < 8.6.49

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.