Parse Server OAuth2 authentication adapter account takeover via identity spoofing
High severity
GitHub Reviewed
Published
Mar 10, 2026
in
parse-community/parse-server
•
Updated Mar 11, 2026
Package
Affected versions
>= 9.0.0-alpha.1, < 9.5.2-alpha.9
< 8.6.22
Patched versions
9.5.2-alpha.9
8.6.22
Description
Published by the National Vulnerability Database
Mar 10, 2026
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Last updated
Mar 11, 2026
Impact
The OAuth2 authentication adapter, when configured without the
useridFieldoption, only verifies that a token is active via the provider's token introspection endpoint, but does not verify that the token belongs to the user identified byauthData.id. An attacker with any valid OAuth2 token from the same provider can authenticate as any other user.This affects any Parse Server deployment that uses the generic OAuth2 authentication adapter (configured with
oauth2: true) without setting theuseridFieldoption.Patches
The vulnerability is fixed by defaulting
useridFieldtosub, which is the standard subject identifier field defined by RFC 7662. The adapter now always validates the token's identity against the claimed user ID, even whenuseridFieldis not explicitly configured.Workarounds
Set the
useridFieldoption to the appropriate field name for your OAuth2 provider (e.g.sub) in the Parse Server authentication configuration.References
References