CVE-2026-33627

EUVD-2026-14980
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.61 and 9.6.0-alpha.55, an authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery codes. The endpoint internally uses master-level authentication for the session query, and the master context leaks through to the user data, bypassing auth adapter sanitization. An attacker who obtains a user's session token can extract MFA secrets to generate valid TOTP codes indefinitely. This issue has been patched in versions 8.6.61 and 9.6.0-alpha.55.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
parseplatformparse-server
𝑥
< 8.6.61
parseplatformparse-server
9.0.0 ≤
𝑥
< 9.6.0
parseplatformparse-server
9.6.0:alpha1
parseplatformparse-server
9.6.0:alpha10
parseplatformparse-server
9.6.0:alpha11
parseplatformparse-server
9.6.0:alpha12
parseplatformparse-server
9.6.0:alpha13
parseplatformparse-server
9.6.0:alpha14
parseplatformparse-server
9.6.0:alpha15
parseplatformparse-server
9.6.0:alpha16
parseplatformparse-server
9.6.0:alpha17
parseplatformparse-server
9.6.0:alpha18
parseplatformparse-server
9.6.0:alpha19
parseplatformparse-server
9.6.0:alpha2
parseplatformparse-server
9.6.0:alpha20
parseplatformparse-server
9.6.0:alpha21
parseplatformparse-server
9.6.0:alpha22
parseplatformparse-server
9.6.0:alpha23
parseplatformparse-server
9.6.0:alpha24
parseplatformparse-server
9.6.0:alpha25
parseplatformparse-server
9.6.0:alpha26
parseplatformparse-server
9.6.0:alpha27
parseplatformparse-server
9.6.0:alpha28
parseplatformparse-server
9.6.0:alpha29
parseplatformparse-server
9.6.0:alpha3
parseplatformparse-server
9.6.0:alpha30
parseplatformparse-server
9.6.0:alpha31
parseplatformparse-server
9.6.0:alpha32
parseplatformparse-server
9.6.0:alpha33
parseplatformparse-server
9.6.0:alpha34
parseplatformparse-server
9.6.0:alpha35
parseplatformparse-server
9.6.0:alpha36
parseplatformparse-server
9.6.0:alpha37
parseplatformparse-server
9.6.0:alpha38
parseplatformparse-server
9.6.0:alpha39
parseplatformparse-server
9.6.0:alpha4
parseplatformparse-server
9.6.0:alpha40
parseplatformparse-server
9.6.0:alpha41
parseplatformparse-server
9.6.0:alpha42
parseplatformparse-server
9.6.0:alpha43
parseplatformparse-server
9.6.0:alpha44
parseplatformparse-server
9.6.0:alpha45
parseplatformparse-server
9.6.0:alpha46
parseplatformparse-server
9.6.0:alpha47
parseplatformparse-server
9.6.0:alpha48
parseplatformparse-server
9.6.0:alpha49
parseplatformparse-server
9.6.0:alpha5
parseplatformparse-server
9.6.0:alpha50
parseplatformparse-server
9.6.0:alpha51
parseplatformparse-server
9.6.0:alpha52
parseplatformparse-server
9.6.0:alpha53
parseplatformparse-server
9.6.0:alpha54
parseplatformparse-server
9.6.0:alpha6
parseplatformparse-server
9.6.0:alpha7
parseplatformparse-server
9.6.0:alpha8
parseplatformparse-server
9.6.0:alpha9
𝑥
= Vulnerable software versions