CVE-2026-33624: Parse Server: MFA recovery code single-use bypass via concurrent requests
An attacker who obtains a user’s password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user’s password, a valid recovery code, and the ability to send concurrent requests within milliseconds.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-33624 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →