Intel

AIKIDO-2026-10693

parse-server is vulnerable to Race Condition

Race ConditionGHSA-jpq4-7fmq-q5fj

21

Low Risk

This Affects:

JSparse-server
1.0.0 - 8.6.75
Fixed in 8.6.76
9.0.0 - 9.8.0
Fixed in 9.9.0
Are you affected? Scan for Free

TL;DR

Concurrent /login requests can both validate the same SMS one-time password because optimistic locking only constrained array-shaped auth fields while SMS OTP values are stored as primitives, so two racing updates can succeed and issue separate sessions. The maintenance release generalizes optimistic locking to primitive and array auth fields via a shared helper so concurrent consumers lose the update predicate and see a controlled auth failure instead.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

parse-server is vulnerable to Race Condition in versions 9.0.0 - 9.8.0 and 1.0.0 - 8.6.75.

How to fix this

Upgrade the parse-server library to the patch version.