GHSA-2299-ghjr-6vjp

Suggest an improvement
Source
https://github.com/advisories/GHSA-2299-ghjr-6vjp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-2299-ghjr-6vjp/GHSA-2299-ghjr-6vjp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2299-ghjr-6vjp
Aliases
Published
2026-03-24T19:48:24Z
Modified
2026-03-27T22:11:19.871863Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Parse Server: MFA recovery code single-use bypass via concurrent requests
Details

Impact

An attacker who obtains a user's password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user's password, a valid recovery code, and the ability to send concurrent requests within milliseconds.

Patches

The login handler now uses optimistic locking when updating auth data that contains consumed single-use tokens. If a concurrent request has already modified the recovery array, the update fails and the login is rejected.

Workarounds

There are no known workarounds.

Database specific
{
    "nvd_published_at": "2026-03-24T19:16:55Z",
    "github_reviewed_at": "2026-03-24T19:48:24Z",
    "cwe_ids": [
        "CWE-367"
    ],
    "severity": "LOW",
    "github_reviewed": true
}
References

Affected packages

npm / parse-server

Package

Affected ranges

Type
SEMVER
Events
Introduced
9.0.0
Fixed
9.6.0-alpha.54

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-2299-ghjr-6vjp/GHSA-2299-ghjr-6vjp.json"

npm / parse-server

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.6.60

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-2299-ghjr-6vjp/GHSA-2299-ghjr-6vjp.json"