Vulnerabilities/

Parse Server: MFA recovery code single-use bypass via concurrent requests

Severity:
Low

Description

An attacker who obtains a user’s password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user’s password, a valid recovery code, and the ability to send concurrent requests within milliseconds.

Recommendation

Update the parse-server package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
parse-server
Anything's wrong? Let us know Last updated on March 27, 2026