Impact
The OAuth2 authentication adapter, when configured without the useridField option, only verifies that a token is active via the provider's token introspection endpoint, but does not verify that the token belongs to the user identified by authData.id. An attacker with any valid OAuth2 token from the same provider can authenticate as any other user.
This affects any Parse Server deployment that uses the generic OAuth2 authentication adapter (configured with oauth2: true) without setting the useridField option.
Patches
The vulnerability is fixed by defaulting useridField to sub, which is the standard subject identifier field defined by RFC 7662. The adapter now always validates the token's identity against the claimed user ID, even when useridField is not explicitly configured.
Workarounds
Set the useridField option to the appropriate field name for your OAuth2 provider (e.g. sub) in the Parse Server authentication configuration.
References
Impact
The OAuth2 authentication adapter, when configured without the
useridFieldoption, only verifies that a token is active via the provider's token introspection endpoint, but does not verify that the token belongs to the user identified byauthData.id. An attacker with any valid OAuth2 token from the same provider can authenticate as any other user.This affects any Parse Server deployment that uses the generic OAuth2 authentication adapter (configured with
oauth2: true) without setting theuseridFieldoption.Patches
The vulnerability is fixed by defaulting
useridFieldtosub, which is the standard subject identifier field defined by RFC 7662. The adapter now always validates the token's identity against the claimed user ID, even whenuseridFieldis not explicitly configured.Workarounds
Set the
useridFieldoption to the appropriate field name for your OAuth2 provider (e.g.sub) in the Parse Server authentication configuration.References