Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-32943
March 18, 2026
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.28 and 8.6.48, the password reset mechanism does not enforce single-use guarantees for reset tokens. When a user requests a password reset, the generated token can be consumed by multiple concurrent requests within a short time window. An attacker who has intercepted a password reset token can race the legitimate user's password reset request, causing both requests to succeed. This may result in the legitimate user believing their password was changed successfully while the attacker's password takes effect instead. All Parse Server deployments that use the password reset feature are affected. Starting in versions 9.6.0-alpha.28 and 8.6.48, the password reset token is now atomically validated and consumed as part of the password update operation. The database query that updates the password includes the reset token as a condition, ensuring that only one concurrent request can successfully consume the token. Subsequent requests using the same token will fail because the token has already been cleared. There is no known workaround other than upgrading.
Affected Packages
https://github.com/parse-community/parse-server.git (GITHUB):
Affected version(s) >=2.0.0 <8.6.48
Fix Suggestion:
Update to version 8.6.48
https://github.com/parse-community/parse-server.git (GITHUB):
Affected version(s) >=9.0.0 <9.6.0-alpha.28
Fix Suggestion:
Update to version 9.6.0-alpha.28
parse-server (NPM):
Affected version(s) >=9.0.0 <9.6.0-alpha.28
Fix Suggestion:
Update to version 9.6.0-alpha.28
parse-server (NPM):
Affected version(s) >=1.0.0 <8.6.48
Fix Suggestion:
Update to version 8.6.48
parse-server (NPM):
Affected version(s) >=1.0.0 <8.6.48
Fix Suggestion:
Update to version 8.6.48
Do you need more information?
Contact Us
CVSS v4
Base Score:
2.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Time-of-check Time-of-use (TOCTOU) Race Condition
EPSS
Base Score:
0.03