Sensitive Data Exposure in Parse Server by Parse Community
CVE-2026-33627
7.1HIGH
What is CVE-2026-33627?
Parse Server, an open-source backend platform, has a vulnerability that allows authenticated users to access unsanitized authentication data through the endpoint GET /users/me. This exposure includes sensitive credentials such as Multi-Factor Authentication (MFA) TOTP secrets and recovery codes due to the improper handling of master-level authentication during session queries. Attackers with a user's session token can leak and exploit these secrets to produce valid TOTP codes indefinitely. This critical issue was addressed in the latest versions 8.6.61 and 9.6.0-alpha.55.
Affected Version(s)
parse-server < 8.6.61 < 8.6.61
parse-server >= 9.0.0, < 9.6.0-alpha.55 < 9.0.0, 9.6.0-alpha.55
