Parse Server's MFA recovery codes not consumed after use
High severity
GitHub Reviewed
Published
Mar 10, 2026
in
parse-community/parse-server
•
Updated Mar 11, 2026
Package
Affected versions
>= 9.0.0-alpha.1, < 9.6.0-alpha.7
< 8.6.33
Patched versions
9.6.0-alpha.7
8.6.33
Description
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Published by the National Vulnerability Database
Mar 11, 2026
Last updated
Mar 11, 2026
Impact
When multi-factor authentication (MFA) via TOTP is enabled for a user account, Parse Server generates two single-use recovery codes. These codes are intended as a fallback when the user cannot provide a TOTP token. However, recovery codes are not consumed after use, allowing the same recovery code to be used an unlimited number of times. This defeats the single-use design of recovery codes and weakens the security of MFA-protected accounts.
An attacker who obtains a single recovery code can repeatedly authenticate as the affected user without the code ever being invalidated.
Patches
The fix ensures that each recovery code is removed from the stored recovery code list after a successful login.
Workarounds
There is no known workaround.
References
References