CVE Vulnerabilities

CVE-2026-31875

Operation on a Resource after Expiration or Release

Published: Mar 11, 2026 | Modified: Mar 13, 2026
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.7 and 8.6.33, when multi-factor authentication (MFA) via TOTP is enabled for a user account, Parse Server generates two single-use recovery codes. These codes are intended as a fallback when the user cannot provide a TOTP token. However, recovery codes are not consumed after use, allowing the same recovery code to be used an unlimited number of times. This defeats the single-use design of recovery codes and weakens the security of MFA-protected accounts. An attacker who obtains a single recovery code can repeatedly authenticate as the affected user without the code ever being invalidated. This vulnerability is fixed in 9.6.0-alpha.7 and 8.6.33.

Weakness

The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

Affected Software

NameVendorStart VersionEnd Version
Parse-serverParseplatform*8.6.33 (excluding)
Parse-serverParseplatform9.0.0 (including)9.6.0 (excluding)
Parse-serverParseplatform9.6.0-alpha1 (including)9.6.0-alpha1 (including)
Parse-serverParseplatform9.6.0-alpha2 (including)9.6.0-alpha2 (including)
Parse-serverParseplatform9.6.0-alpha3 (including)9.6.0-alpha3 (including)
Parse-serverParseplatform9.6.0-alpha4 (including)9.6.0-alpha4 (including)
Parse-serverParseplatform9.6.0-alpha5 (including)9.6.0-alpha5 (including)
Parse-serverParseplatform9.6.0-alpha6 (including)9.6.0-alpha6 (including)

References