CVE-2026-33624: Time-of-Check Time-of-Use (TOCTOU) Race Condition in Parse Server MFA Recovery
Vulnerability ID: CVE-2026-33624
CVSS Score: 2.1
Published: 2026-03-24
Parse Server versions prior to 8.6.60 and 9.6.0-alpha.54 contain a Time-of-check Time-of-use (TOCTOU) race condition in the Multi-Factor Authentication (MFA) recovery mechanism. By issuing concurrent login requests, an attacker possessing a user's password and a single valid MFA recovery code can establish multiple active sessions, bypassing the intended single-use restriction of the recovery code.
TL;DR
A race condition in Parse Server allows an attacker to bypass the single-use restriction of MFA recovery codes by sending concurrent login requests, allowing multiple sessions to be established with one code.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Class: Time-of-check Time-of-use (TOCTOU) Race Condition
- CWE ID: CWE-367
- CVSS v4.0 Score: 2.1 (Low)
- Attack Vector: Network
- Exploit Status: Proof of Concept (PoC) Available
- CISA KEV: Not Listed
Affected Systems
- Parse Server Backend
-
parse-server: < 8.6.60 (Fixed in:
8.6.60) -
parse-server: >= 9.0.0, < 9.6.0-alpha.54 (Fixed in:
9.6.0-alpha.54)
Code Analysis
Commit: 5e70094
Fix for MFA recovery code TOCTOU via optimistic locking
Commit: fc3da35
Additional test coverage and fixes for concurrent MFA login
Mitigation Strategies
- Update Parse Server to version 8.6.60 or 9.6.0-alpha.54.
- Ensure backend database adapters (MongoDB/PostgreSQL) are updated to support the new dot-notation optimistic locking queries.
- Monitor application logs for sudden bursts of concurrent login requests to detect exploitation attempts.
Remediation Steps:
- Identify the current running version of Parse Server via package.json or deployment metadata.
- Update the
parse-serverdependency to>= 8.6.60(for 8.x users) or>= 9.6.0-alpha.54(for 9.x users). - Execute integration tests to ensure that MFA mechanisms function correctly with the updated database adapters.
- Deploy the updated application to production environments.
- Invalidate all active sessions for accounts suspected of credential compromise to eliminate redundant tokens.
References
- GitHub Security Advisory: MFA recovery code single-use bypass
- Parse Server Pull Request 10275
- CVE Record: CVE-2026-33624
Read the full report for CVE-2026-33624 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)