Parse Server missing audience validation in Keycloak authentication adapter
Package
Affected versions
>= 9.0.0, < 9.5.2-alpha.5
< 8.6.18
Patched versions
9.5.2-alpha.5
8.6.18
Description
Published by the National Vulnerability Database
Mar 10, 2026
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Impact
The Keycloak authentication adapter does not validate the
azp(authorized party) claim of Keycloak access tokens against the configuredclient-id. A valid access token issued by the same Keycloak realm for a different client application can be used to authenticate as any user on the Parse Server that uses the Keycloak adapter. This enables cross-application account takeover in multi-client Keycloak realms.All Parse Server deployments that use the Keycloak authentication adapter with a Keycloak realm that has multiple client applications are affected.
Patches
The fix replaces the userinfo HTTP call with local JWT verification and enforces
azpclaim validation against the configuredclient-id.Workarounds
None.
References
References