CVE-2026-34224

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.64 and 9.7.0-alpha.8, an attacker who possesses a valid authentication provider token and a single MFA recovery code or SMS one-time password can create multiple authenticated sessions by sending concurrent login requests via the authData login endpoint. This defeats the single-use guarantee of MFA recovery codes and SMS one-time passwords, allowing session persistence even after the legitimate user revokes detected sessions. This issue has been patched in versions 8.6.64 and 9.7.0-alpha.8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha7:*:*:*:node.js:*:*

History

01 Apr 2026, 18:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4
First Time Parseplatform
Parseplatform parse-server
CPE cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha4:*:*:*:node.js:*:*
References () https://github.com/parse-community/parse-server/commit/661f160edac8daac0486bc94413cf9652876ab92 - () https://github.com/parse-community/parse-server/commit/661f160edac8daac0486bc94413cf9652876ab92 - Patch
References () https://github.com/parse-community/parse-server/commit/e7efbebba398ce6abe5b6b6fb9829c6ebe310fbf - () https://github.com/parse-community/parse-server/commit/e7efbebba398ce6abe5b6b6fb9829c6ebe310fbf - Patch
References () https://github.com/parse-community/parse-server/pull/10326 - () https://github.com/parse-community/parse-server/pull/10326 - Issue Tracking, Patch
References () https://github.com/parse-community/parse-server/pull/10327 - () https://github.com/parse-community/parse-server/pull/10327 - Issue Tracking, Patch
References () https://github.com/parse-community/parse-server/security/advisories/GHSA-w73w-g5xw-rwhf - () https://github.com/parse-community/parse-server/security/advisories/GHSA-w73w-g5xw-rwhf - Patch, Vendor Advisory

31 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 15:16

Updated : 2026-04-02 16:16


NVD link : CVE-2026-34224

Mitre link : CVE-2026-34224

CVE.ORG link : CVE-2026-34224


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition