Parse Server has a password reset token single-use bypass via concurrent requests
Low severity
GitHub Reviewed
Published
Mar 16, 2026
in
parse-community/parse-server
•
Updated Mar 19, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.28
< 8.6.48
Patched versions
9.6.0-alpha.28
8.6.48
Description
Published to the GitHub Advisory Database
Mar 17, 2026
Reviewed
Mar 17, 2026
Published by the National Vulnerability Database
Mar 18, 2026
Last updated
Mar 19, 2026
Impact
The password reset mechanism does not enforce single-use guarantees for reset tokens. When a user requests a password reset, the generated token can be consumed by multiple concurrent requests within a short time window. An attacker who has intercepted a password reset token can race the legitimate user's password reset request, causing both requests to succeed. This may result in the legitimate user believing their password was changed successfully while the attacker's password takes effect instead.
All Parse Server deployments that use the password reset feature are affected.
Patches
The password reset token is now atomically validated and consumed as part of the password update operation. The database query that updates the password includes the reset token as a condition, ensuring that only one concurrent request can successfully consume the token. Subsequent requests using the same token will fail because the token has already been cleared.
Workarounds
There is no known workaround other than upgrading.
References