CVE-2026-33409: Parse Server has an auth provider validation bypass on login via partial authData
An authentication bypass vulnerability allows an attacker to log in as any user who has linked a third-party authentication provider, without knowing the user’s credentials. The attacker only needs to know the user’s provider ID to gain full access to their account, including a valid session token.
This affects Parse Server deployments where the server option allowExpiredAuthDataToken is set to true. The default value is false.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-33409 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →