CVE-2026-31875
EUVD-2026-1128011.03.2026, 18:16
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.7 and 8.6.33, when multi-factor authentication (MFA) via TOTP is enabled for a user account, Parse Server generates two single-use recovery codes. These codes are intended as a fallback when the user cannot provide a TOTP token. However, recovery codes are not consumed after use, allowing the same recovery code to be used an unlimited number of times. This defeats the single-use design of recovery codes and weakens the security of MFA-protected accounts. An attacker who obtains a single recovery code can repeatedly authenticate as the affected user without the code ever being invalidated. This vulnerability is fixed in 9.6.0-alpha.7 and 8.6.33.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| parseplatform | parse-server | 𝑥 < 8.6.33 |
| parseplatform | parse-server | 9.0.0 ≤ 𝑥 < 9.6.0 |
| parseplatform | parse-server | 9.6.0:alpha1 |
| parseplatform | parse-server | 9.6.0:alpha2 |
| parseplatform | parse-server | 9.6.0:alpha3 |
| parseplatform | parse-server | 9.6.0:alpha4 |
| parseplatform | parse-server | 9.6.0:alpha5 |
| parseplatform | parse-server | 9.6.0:alpha6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration