CVE-2026-33627: Parse Server exposes auth data via /users/me endpoint
An authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery codes. The endpoint internally uses master-level authentication for the session query, and the master context leaks through to the user data, bypassing auth adapter sanitization. An attacker who obtains a user’s session token can extract MFA secrets to generate valid TOTP codes indefinitely.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-33627 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →