๐Ÿ” CVE Alert

CVE-2026-34215

MEDIUM 6.5

Parse Server: Auth data exposed via verify password endpoint

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
15th

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.63 and 9.7.0-alpha.7, the verify password endpoint returns unsanitized authentication data, including MFA TOTP secrets, recovery codes, and OAuth access tokens. An attacker who knows a user's password can extract the MFA secret to generate valid MFA codes, defeating multi-factor authentication protection. This issue has been patched in versions 8.6.63 and 9.7.0-alpha.7.

CWE CWE-200
Vendor parse-community
Product parse-server
Published Mar 31, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for parse-community parse-server

Be the first to know when new medium vulnerabilities affecting parse-community parse-server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

parse-community / parse-server
< 8.6.63 >= 9.0.0, < 9.7.0-alpha.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/parse-community/parse-server/security/advisories/GHSA-wp76-gg32-8258 github.com: https://github.com/parse-community/parse-server/pull/10323 github.com: https://github.com/parse-community/parse-server/pull/10324 github.com: https://github.com/parse-community/parse-server/commit/770be8647424d92f5425c41fa81065ffbbb171ed github.com: https://github.com/parse-community/parse-server/commit/a1d4e7b12a12f16d3870dbee582a36765858e94c