Parse Server has a password reset token single-use bypass via concurrent requests
- Severity:
- Low
Description
The password reset mechanism does not enforce single-use guarantees for reset tokens. When a user requests a password reset, the generated token can be consumed by multiple concurrent requests within a short time window.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.48 >= 9.0.0, < 9.6.0-alpha.28** Patched version(s): **8.6.48 9.6.0-alpha.28**
References
Related Issues
- Parse Server: MFA recovery code single-use bypass via concurrent requests - CVE-2026-33624
- Parse Server has a NoSQL injection via token type in password reset and email verification endpoints - CVE-2026-30941
- Parse Server has role escalation and CLP bypass via direct `_Join` table write - CVE-2026-30966
- Parse Server has a protected fields bypass via dot-notation in query and sort - CVE-2026-31872
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 19, 2026