Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33624: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in parse-community parse-server

0
Low
VulnerabilityCVE-2026-33624cvecve-2026-33624cwe-367
Published: Tue Mar 24 2026 (03/24/2026, 18:28:52 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-33624 is a TOCTOU race condition vulnerability in parse-community's parse-server affecting versions prior to 8. 6. 60 and 9. 6. 0-alpha. 54. An attacker with a user's password and a single MFA recovery code can exploit concurrent login requests to reuse the recovery code multiple times, bypassing its intended single-use restriction. Exploitation requires high privileges (user password), a valid recovery code, and the ability to send rapid concurrent requests. This flaw undermines MFA recovery code security but does not allow unauthorized access without credentials. The vulnerability has a low CVSS score (2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:18:23 UTC

Technical Analysis

CVE-2026-33624 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability categorized under CWE-367, found in the parse-community parse-server, an open-source backend platform running on Node.js. The flaw exists in the handling of MFA recovery codes during user authentication. Specifically, prior to versions 8.6.60 and 9.6.0-alpha.54, the system fails to properly synchronize the validation and consumption of MFA recovery codes. An attacker who has obtained both the user's password and a single valid MFA recovery code can send multiple concurrent login requests within milliseconds. Due to the race condition, the recovery code is not invalidated immediately upon first use, allowing it to be reused multiple times contrary to its intended single-use design. This undermines the security guarantees of MFA recovery codes, potentially allowing repeated account access using the same recovery code. However, exploitation requires possession of the user's password and a valid recovery code, as well as the capability to send rapid concurrent requests, making it a targeted attack vector. The vulnerability does not allow bypassing authentication without credentials. The issue has been patched in parse-server versions 8.6.60 and 9.6.0-alpha.54. The CVSS 4.0 base score is 2.1, reflecting low severity due to the high attack complexity and prerequisite credentials. No known exploits have been reported in the wild to date.

Potential Impact

The primary impact of this vulnerability is the compromise of the intended single-use nature of MFA recovery codes. Attackers who have already obtained user credentials and a recovery code can reuse the recovery code multiple times to regain access to the account, potentially bypassing intended security controls. This could facilitate persistent unauthorized access, account takeover, or further lateral movement within an organization’s systems. While the vulnerability does not allow initial credential compromise, it weakens the security posture of MFA mechanisms, which are critical for protecting sensitive data and services. Organizations relying on parse-server for backend services, especially those managing sensitive user data or critical applications, may face increased risk of account abuse and reduced trust in MFA protections. The low CVSS score indicates limited impact scope and exploitation difficulty, but the risk is significant in environments where credential theft is possible or where attackers can perform high-speed concurrent requests.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 8.6.60 or later, or 9.6.0-alpha.54 or later, where the race condition has been fixed. In addition to patching, administrators should monitor authentication logs for unusual patterns of concurrent login attempts using MFA recovery codes, which may indicate exploitation attempts. Implementing rate limiting or throttling on login endpoints can reduce the feasibility of rapid concurrent requests needed to exploit this vulnerability. Educate users on safeguarding their passwords and MFA recovery codes to prevent credential theft. Consider deploying additional anomaly detection systems to flag suspicious authentication behaviors. For environments where immediate patching is not feasible, temporarily disabling MFA recovery codes or enforcing stricter session management policies may reduce risk. Finally, ensure that incident response plans include procedures for handling potential MFA recovery code abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T14:24:11.617Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2dfdbf4197a8e3b622b3a

Added to database: 3/24/2026, 7:02:51 PM

Last enriched: 3/31/2026, 8:18:23 PM

Last updated: 5/7/2026, 9:56:41 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses