parse-server is vulnerable to Race Condition
21
Low Risk
Concurrent /login requests can both validate the same SMS one-time password because optimistic locking only constrained array-shaped auth fields while SMS OTP values are stored as primitives, so two racing updates can succeed and issue separate sessions. The maintenance release generalizes optimistic locking to primitive and array auth fields via a shared helper so concurrent consumers lose the update predicate and see a controlled auth failure instead.
You are affected if you are using a version that falls within the vulnerable range.
parse-server is vulnerable to Race Condition in versions 9.0.0 - 9.8.0 and 1.0.0 - 8.6.75.
Upgrade the parse-server library to the patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant