Vulnerability Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.29 and 8.6.49, a user can sign up without providing credentials by sending an empty `authData` object, bypassing the username and password requirement. This allows the creation of authenticated sessions without proper credentials, even when anonymous users are disabled. The fix in 9.6.0-alpha.29 and 8.6.49 ensures that empty or non-actionable `authData` is treated the same as absent `authData` for the purpose of credential validation on new user creation. Username and password are now required when no valid auth provider data is present. As a workaround, use a Cloud Code `beforeSave` trigger on the `_User` class to reject signups where `authData` is empty and no username/password is provided.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parseplatform | Parse-Server | < 8.6.49 |
Related Weaknesses (CWE)
References
- https://github.com/parse-community/parse-server/pull/10219Issue Tracking
- https://github.com/parse-community/parse-server/pull/10220Issue Tracking
- https://github.com/parse-community/parse-server/security/advisories/GHSA-wjqw-r9Vendor Advisory
FAQ
What is CVE-2026-33042?
CVE-2026-33042 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.29 and 8.6.49, a user can sign up without providing credentials by sending ...
How severe is CVE-2026-33042?
CVE-2026-33042 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33042?
Check the references section above for vendor advisories and patch information. Affected products include: Parseplatform Parse-Server.