CVE-2026-34224: Parse Server has an MFA single-use token bypass via concurrent authData login requests
(updated )
An attacker who possesses a valid authentication provider token and a single MFA recovery code or SMS one-time password can create multiple authenticated sessions by sending concurrent login requests via the authData login endpoint. This defeats the single-use guarantee of MFA recovery codes and SMS one-time passwords, allowing session persistence even after the legitimate user revokes detected sessions.
References
- github.com/advisories/GHSA-w73w-g5xw-rwhf
- github.com/parse-community/parse-server
- github.com/parse-community/parse-server/commit/661f160edac8daac0486bc94413cf9652876ab92
- github.com/parse-community/parse-server/commit/e7efbebba398ce6abe5b6b6fb9829c6ebe310fbf
- github.com/parse-community/parse-server/pull/10326
- github.com/parse-community/parse-server/pull/10327
- github.com/parse-community/parse-server/security/advisories/GHSA-w73w-g5xw-rwhf
- nvd.nist.gov/vuln/detail/CVE-2026-34224
Code Behaviors & Features
Detect and mitigate CVE-2026-34224 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →