CVE-2026-33624
UNKNOWN
NVD
CVSS Score
0
Severity
UNKNOWN
Published
Mar 24, 2026
Vendor
unknown
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.60 and 9.6.0-alpha.54, an attacker who obtains a user's password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user's password, a valid recovery code, and the ability to send concurrent requests within milliseconds. This issue has been patched in versions 8.6.60 and 9.6.0-alpha.54.
References
- https://github.com/parse-community/parse-server/commit/5e70094250a36bfcc14ecd49592be2b94fba66ff
- https://github.com/parse-community/parse-server/commit/fc3da35a81d5083b453e8967cabcc880f1a3bd0c
- https://github.com/parse-community/parse-server/pull/10275
- https://github.com/parse-community/parse-server/pull/10276
- https://github.com/parse-community/parse-server/security/advisories/GHSA-2299-ghjr-6vjp