Description
An authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery codes. The endpoint internally uses master-level authentication for the session query, and the master context leaks through to the user data, bypassing auth adapter sanitization.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.61 >= 9.0.0, < 9.6.0-alpha.55** Patched version(s): **8.6.61 9.6.0-alpha.55**
References
Related Issues
- Parse Server: Account takeover via JWT algorithm confusion in Google auth adapter - CVE-2026-27804
- Parse Server vulnerable to user enumeration via email verification endpoint - CVE-2026-31901
- Parse Server has a rate limit bypass via batch request endpoint - CVE-2026-30972
- Parse Server has an auth provider validation bypass on login via partial authData - CVE-2026-33409
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 27, 2026