CVE-2026-34215 PUBLISHED

Parse Server: Auth data exposed via verify password endpoint

Assigner: GitHub_M
Reserved: 26.03.2026 Published: 31.03.2026 Updated: 31.03.2026

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.63 and 9.7.0-alpha.7, the verify password endpoint returns unsanitized authentication data, including MFA TOTP secrets, recovery codes, and OAuth access tokens. An attacker who knows a user's password can extract the MFA secret to generate valid MFA codes, defeating multi-factor authentication protection. This issue has been patched in versions 8.6.63 and 9.7.0-alpha.7.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor parse-community
Product parse-server
Versions
  • Version < 8.6.63 is affected
  • Version >= 9.0.0, < 9.7.0-alpha.7 is affected

References

Problem Types

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE