Generated remediation guidance and an executive summary. No account required.
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.63 and 9.7.0-alpha.7, the verify password endpoint returns unsanitized authentication data, including MFA TOTP secrets, recovery codes, and OAuth access tokens. An attacker who knows a user's password can extract the MFA secret to generate valid MFA codes, defeating multi-factor authentication protection. This issue has been patched in versions 8.6.63 and 9.7.0-alpha.7.
Use CWE-200, Parseplatform vendor hub and Parse-Server product page to widen CVE-2026-34215 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-34532, CVE-2026-34784 and CVE-2026-34573 for nearby disclosures in the same product family.