Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33627: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in parse-community parse-server

0
High
VulnerabilityCVE-2026-33627cvecve-2026-33627cwe-200
Published: Tue Mar 24 2026 (03/24/2026, 18:31:14 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

CVE-2026-33627 is a high-severity vulnerability in parse-community's parse-server affecting versions prior to 8. 6. 61 and between 9. 0. 0 and 9. 6. 0-alpha. 55. Authenticated users calling GET /users/me receive unsanitized authentication data, including sensitive MFA TOTP secrets and recovery codes. This occurs because the endpoint uses master-level authentication internally, causing master context to leak into user data and bypass sanitization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:24:22 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js and is widely used for mobile and web applications. CVE-2026-33627 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting parse-server versions prior to 8.6.61 and versions from 9.0.0 up to but not including 9.6.0-alpha.55. The flaw arises in the GET /users/me endpoint, which returns user data. Internally, this endpoint uses master-level authentication to query session information, but this master context leaks into the user data response. Consequently, the sanitization normally applied by the authentication adapter is bypassed, causing sensitive authentication data to be exposed. Specifically, this includes multi-factor authentication (MFA) Time-based One-Time Password (TOTP) secrets and recovery codes. An attacker who has obtained a valid user session token can exploit this vulnerability to retrieve these secrets and generate valid TOTP codes indefinitely, effectively bypassing MFA protections. The vulnerability requires only a valid session token (privilege level: low) and no user interaction, making it relatively easy to exploit if session tokens are compromised. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond a session token, no user interaction, and high confidentiality impact. The vulnerability has been patched in parse-server versions 8.6.61 and 9.6.0-alpha.55. No public exploits have been reported yet, but the potential for abuse is significant given the exposure of MFA secrets.

Potential Impact

This vulnerability poses a serious risk to organizations using affected versions of parse-server, especially those relying on MFA for securing user accounts. An attacker who compromises a user's session token can extract MFA secrets, allowing indefinite generation of valid TOTP codes and effectively bypassing multi-factor authentication. This undermines the integrity of user authentication and can lead to unauthorized access to sensitive systems and data. The exposure of recovery codes further increases the risk by enabling attackers to regain access even if MFA is reset. Organizations may face data breaches, account takeovers, and potential lateral movement within networks. The ease of exploitation (requiring only a session token) and the high confidentiality impact make this a critical concern for any service relying on parse-server for user authentication. The vulnerability also increases the risk of persistent unauthorized access, complicating incident response and remediation efforts.

Mitigation Recommendations

The primary mitigation is to upgrade parse-server to version 8.6.61 or later, or 9.6.0-alpha.55 or later, where the vulnerability is patched. Organizations should also implement strict session token management practices, including short token lifetimes, token revocation mechanisms, and monitoring for unusual session activity to reduce the risk of token theft. Employing additional layers of security such as IP whitelisting, anomaly detection, and device fingerprinting can help detect and prevent unauthorized use of stolen tokens. Reviewing and restricting access to the GET /users/me endpoint and ensuring that sensitive fields are properly sanitized in custom implementations can reduce exposure. Regular security audits and penetration testing focused on authentication flows are recommended to detect similar issues. Finally, educating users on securing their session tokens and MFA credentials is important to reduce the risk of token compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T14:24:11.617Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2dfdbf4197a8e3b622b41

Added to database: 3/24/2026, 7:02:51 PM

Last enriched: 3/31/2026, 8:24:22 PM

Last updated: 5/7/2026, 11:07:06 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses