Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31875: CWE-672: Operation on a Resource after Expiration or Release in parse-community parse-server

0
High
VulnerabilityCVE-2026-31875cvecve-2026-31875cwe-672
Published: Wed Mar 11 2026 (03/11/2026, 18:04:55 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.7 and 8.6.33, when multi-factor authentication (MFA) via TOTP is enabled for a user account, Parse Server generates two single-use recovery codes. These codes are intended as a fallback when the user cannot provide a TOTP token. However, recovery codes are not consumed after use, allowing the same recovery code to be used an unlimited number of times. This defeats the single-use design of recovery codes and weakens the security of MFA-protected accounts. An attacker who obtains a single recovery code can repeatedly authenticate as the affected user without the code ever being invalidated. This vulnerability is fixed in 9.6.0-alpha.7 and 8.6.33.

AI-Powered Analysis

AILast updated: 03/11/2026, 18:49:01 UTC

Technical Analysis

Parse Server is an open-source backend framework that supports multi-factor authentication (MFA) via Time-based One-Time Passwords (TOTP). In affected versions prior to 9.6.0-alpha.7 and 8.6.33, the system generates two single-use recovery codes per user as a fallback mechanism when TOTP tokens are unavailable. These recovery codes are designed to be consumed and invalidated upon use to prevent reuse. However, due to a logic flaw categorized as CWE-672 (Operation on a Resource after Expiration or Release), the recovery codes remain valid indefinitely after their initial use. This means an attacker who obtains any one recovery code can authenticate repeatedly as the targeted user without the code ever being revoked or marked as used. The vulnerability arises from failure to update or delete the recovery code resource after consumption, violating the intended single-use constraint. Exploitation requires possession of a recovery code, which could be obtained through phishing, social engineering, or other credential theft methods. The vulnerability has a CVSS 4.0 score of 8.2, indicating high severity, with network attack vector, high impact on confidentiality, and no user interaction required. The flaw compromises the integrity of MFA protections, effectively reducing account security to single-factor authentication once a recovery code is compromised. The issue is fixed in parse-server versions 9.6.0-alpha.7 and 8.6.33 by ensuring recovery codes are invalidated after use.

Potential Impact

This vulnerability significantly undermines the security of MFA-protected accounts on parse-server deployments worldwide. Organizations relying on parse-server for backend services and enabling MFA with recovery codes are at risk of persistent unauthorized access if an attacker obtains a single recovery code. The attacker can bypass MFA repeatedly without detection, potentially leading to account takeover, data breaches, and unauthorized actions within affected applications. The flaw impacts confidentiality and integrity by allowing attackers to impersonate legitimate users indefinitely. Since parse-server is used in various industries including education, mobile applications, and enterprise services, the scope of impact is broad. The vulnerability could facilitate lateral movement within networks, data exfiltration, and disruption of services. Although no exploits are currently known in the wild, the ease of exploitation after obtaining a recovery code and the high severity score indicate a strong potential for abuse. Organizations with parse-server deployments should consider this a critical risk to user authentication security.

Mitigation Recommendations

The primary mitigation is to upgrade parse-server to version 9.6.0-alpha.7 or later, or 8.6.33 or later, where the recovery code invalidation logic is corrected. Until upgrades can be applied, organizations should consider disabling MFA recovery codes or implementing additional monitoring and alerting for repeated use of the same recovery code. Tightening access controls and auditing mechanisms around recovery code generation and usage can help detect suspicious activity. Educating users about safeguarding recovery codes and employing secure distribution methods reduces the risk of code compromise. Additionally, integrating anomaly detection to flag multiple authentications using the same recovery code can provide early warning. Organizations should review their incident response plans to address potential account compromises stemming from this vulnerability. Finally, applying network-level protections and limiting exposure of parse-server endpoints can reduce attacker access opportunities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T19:02:25.014Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1b88a2f860ef943602166

Added to database: 3/11/2026, 6:46:34 PM

Last enriched: 3/11/2026, 6:49:01 PM

Last updated: 3/14/2026, 12:45:48 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses