Parse Server: MFA recovery code single-use bypass via concurrent requests
- Severity:
- Low
Description
An attacker who obtains a user’s password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user’s password, a valid recovery code, and the ability to send concurrent requests within milliseconds.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.60 >= 9.0.0, < 9.6.0-alpha.54** Patched version(s): **8.6.60 9.6.0-alpha.54**
References
Related Issues
- Parse Server has a password reset token single-use bypass via concurrent requests - CVE-2026-32943
- Parse Server's MFA recovery codes not consumed after use - CVE-2026-31875
- Parse Server has a protected fields bypass via dot-notation in query and sort - CVE-2026-31872
- Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries - CVE-2026-32728
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 27, 2026