Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31901: CWE-204: Observable Response Discrepancy in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-31901cvecve-2026-31901cwe-204
Published: Wed Mar 11 2026 (03/11/2026, 19:18:06 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.34 and 9.6.0-alpha.8, the email verification endpoint (/verificationEmailRequest) returns distinct error responses depending on whether an email address belongs to an existing user, is already verified, or does not exist. An attacker can send requests with different email addresses and observe the error codes to determine which email addresses are registered in the application. This is a user enumeration vulnerability that affects any Parse Server deployment with email verification enabled (verifyUserEmails: true). This vulnerability is fixed in 8.6.34 and 9.6.0-alpha.8.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:00:44 UTC

Technical Analysis

CVE-2026-31901 is a vulnerability classified under CWE-204 (Observable Response Discrepancy) found in parse-community's parse-server, an open-source backend framework for Node.js. The issue exists in the email verification endpoint (/verificationEmailRequest) in versions prior to 8.6.34 and 9.6.0-alpha.8 when the verifyUserEmails feature is enabled. The endpoint returns different error responses based on the state of the email address submitted: whether it belongs to an existing user, is already verified, or does not exist at all. This discrepancy in responses allows an unauthenticated attacker to enumerate valid user email addresses by sending crafted requests and analyzing the returned error codes. Such user enumeration can facilitate targeted phishing, credential stuffing, or social engineering attacks. The vulnerability does not require authentication or user interaction and is exploitable remotely over the network. Although it does not directly compromise data confidentiality, integrity, or availability, it leaks sensitive information about user registration status, which is a privacy concern. The vulnerability has been addressed in parse-server versions 8.6.34 and 9.6.0-alpha.8 by standardizing error responses to prevent information leakage. No known exploits are reported in the wild as of the publication date. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality with no impact on integrity or availability.

Potential Impact

The primary impact of CVE-2026-31901 is the leakage of user registration information through user enumeration. This can enable attackers to compile lists of valid email addresses registered on affected parse-server deployments. Such information can be leveraged for targeted phishing campaigns, social engineering, brute force or credential stuffing attacks, increasing the risk of account compromise. Organizations relying on parse-server for backend services with email verification enabled may inadvertently expose their user base to privacy violations and subsequent attacks. While the vulnerability does not directly affect system integrity or availability, the indirect consequences can lead to reputational damage, loss of user trust, and potential regulatory compliance issues related to user data privacy. Enterprises with large user bases or those in regulated industries should consider this vulnerability a significant privacy risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

The primary mitigation is to upgrade parse-server to version 8.6.34 or later, or 9.6.0-alpha.8 or later, where the vulnerability is fixed by normalizing error responses to prevent user enumeration. Until upgrades can be applied, administrators should consider implementing additional controls such as rate limiting and IP throttling on the /verificationEmailRequest endpoint to reduce the feasibility of mass enumeration attempts. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious patterns of email verification requests can further mitigate risk. Monitoring logs for repeated failed verification attempts from single IPs or ranges can help identify reconnaissance activity. Additionally, consider disabling email verification temporarily if feasible or implementing CAPTCHAs on the verification request endpoint to hinder automated attacks. Educating users about phishing risks and encouraging strong, unique passwords can reduce the impact of any subsequent attacks leveraging enumerated email addresses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T21:59:02.689Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1c6312f860ef9436c35e1

Added to database: 3/11/2026, 7:44:49 PM

Last enriched: 3/11/2026, 8:00:44 PM

Last updated: 3/13/2026, 12:22:18 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses