The vulnerability lies in the Keycloak authentication adapter of Parse Server, where it failed to validate the audience of JWT access tokens. Specifically, the azp (authorized party) claim was not checked against the server's configured client-id. The vulnerable code, found in src/Adapters/Auth/keycloak.js, contained a function named handleAuth. This function would take a user's access_token and use it to query the Keycloak /userinfo endpoint. It then trusted the response if the sub (subject/user ID) claim matched, without verifying which client application the token was issued for. This flaw allowed an attacker with a valid token from a different application within the same Keycloak realm to impersonate any user on the vulnerable Parse Server, leading to account takeover. The patch remediates this by removing the handleAuth function and replacing it with verifyAccessToken, which performs local JWT validation. This new function correctly verifies the token's signature, issuer (iss), and, crucially, the authorized party (azp), ensuring the token is valid for the specific Parse Server application.