CVE-2026-33624

EUVD-2026-14978
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.60 and 9.6.0-alpha.54, an attacker who obtains a user's password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user's password, a valid recovery code, and the ability to send concurrent requests within milliseconds. This issue has been patched in versions 8.6.60 and 9.6.0-alpha.54.
TOCTOU
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.7 LOW
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
parseplatformparse-server
𝑥
< 8.6.60
parseplatformparse-server
9.0.0 ≤
𝑥
< 9.6.0
parseplatformparse-server
9.6.0:alpha1
parseplatformparse-server
9.6.0:alpha10
parseplatformparse-server
9.6.0:alpha11
parseplatformparse-server
9.6.0:alpha12
parseplatformparse-server
9.6.0:alpha13
parseplatformparse-server
9.6.0:alpha14
parseplatformparse-server
9.6.0:alpha15
parseplatformparse-server
9.6.0:alpha16
parseplatformparse-server
9.6.0:alpha17
parseplatformparse-server
9.6.0:alpha18
parseplatformparse-server
9.6.0:alpha19
parseplatformparse-server
9.6.0:alpha2
parseplatformparse-server
9.6.0:alpha20
parseplatformparse-server
9.6.0:alpha21
parseplatformparse-server
9.6.0:alpha22
parseplatformparse-server
9.6.0:alpha23
parseplatformparse-server
9.6.0:alpha24
parseplatformparse-server
9.6.0:alpha25
parseplatformparse-server
9.6.0:alpha26
parseplatformparse-server
9.6.0:alpha27
parseplatformparse-server
9.6.0:alpha28
parseplatformparse-server
9.6.0:alpha29
parseplatformparse-server
9.6.0:alpha3
parseplatformparse-server
9.6.0:alpha30
parseplatformparse-server
9.6.0:alpha31
parseplatformparse-server
9.6.0:alpha32
parseplatformparse-server
9.6.0:alpha33
parseplatformparse-server
9.6.0:alpha34
parseplatformparse-server
9.6.0:alpha35
parseplatformparse-server
9.6.0:alpha36
parseplatformparse-server
9.6.0:alpha37
parseplatformparse-server
9.6.0:alpha38
parseplatformparse-server
9.6.0:alpha39
parseplatformparse-server
9.6.0:alpha4
parseplatformparse-server
9.6.0:alpha40
parseplatformparse-server
9.6.0:alpha41
parseplatformparse-server
9.6.0:alpha42
parseplatformparse-server
9.6.0:alpha43
parseplatformparse-server
9.6.0:alpha44
parseplatformparse-server
9.6.0:alpha45
parseplatformparse-server
9.6.0:alpha46
parseplatformparse-server
9.6.0:alpha47
parseplatformparse-server
9.6.0:alpha48
parseplatformparse-server
9.6.0:alpha49
parseplatformparse-server
9.6.0:alpha5
parseplatformparse-server
9.6.0:alpha50
parseplatformparse-server
9.6.0:alpha51
parseplatformparse-server
9.6.0:alpha52
parseplatformparse-server
9.6.0:alpha53
parseplatformparse-server
9.6.0:alpha6
parseplatformparse-server
9.6.0:alpha7
parseplatformparse-server
9.6.0:alpha8
parseplatformparse-server
9.6.0:alpha9
𝑥
= Vulnerable software versions