Parse Server MFA recovery codes not consumed after use
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.7 and 8.6.33, when multi-factor authentication (MFA) via TOTP is enabled for a user account, Parse Server generates two single-use recovery codes. These codes are intended as a fallback when the user cannot provide a TOTP token. However, recovery codes are not consumed after use, allowing the same recovery code to be used an unlimited number of times. This defeats the single-use design of recovery codes and weakens the security of MFA-protected accounts. An attacker who obtains a single recovery code can repeatedly authenticate as the affected user without the code ever being invalidated. This vulnerability is fixed in 9.6.0-alpha.7 and 8.6.33.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | >= 9.0.0-alpha.1, < 9.6.0-alpha.7 | 9.6.0-alpha.7 |
parse-servernpm | < 8.6.33 | 8.6.33 |
Affected products
1- Range: >= 9.0.0 < 9.6.0-alpha.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-4hf6-3x24-c9m8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-31875ghsaADVISORY
- github.com/parse-community/parse-server/releases/tag/8.6.33ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/releases/tag/9.6.0-alpha.7ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-4hf6-3x24-c9m8ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.