CVE-2026-33627
MEDIUMParse Server: Auth data exposed via /users/me endpoint
Title source: cnaDescription
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.61 and 9.6.0-alpha.55, an authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery codes. The endpoint internally uses master-level authentication for the session query, and the master context leaks through to the user data, bypassing auth adapter sanitization. An attacker who obtains a user's session token can extract MFA secrets to generate valid TOTP codes indefinitely. This issue has been patched in versions 8.6.61 and 9.6.0-alpha.55.
Scores
CVSS v3
6.5
EPSS
0.0003
EPSS Percentile
9.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-200
Status
published
Products (4)
npm/parse-server
9.0.0 - 9.6.0-alpha.55npm
parse-community/parse-server
< 8.6.61
parse-community/parse-server
>= 9.0.0, < 9.6.0-alpha.55
parseplatform/parse-server
9.6.0 alpha1 (47 CPE variants)
Published
Mar 24, 2026
Tracked Since
Mar 25, 2026