Parse Server email verification resend page leaks user existence
Moderate severity
GitHub Reviewed
Published
Mar 19, 2026
in
parse-community/parse-server
•
Updated Mar 30, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.40
< 8.6.51
Patched versions
9.6.0-alpha.40
8.6.51
Description
Published to the GitHub Advisory Database
Mar 19, 2026
Reviewed
Mar 19, 2026
Published by the National Vulnerability Database
Mar 24, 2026
Last updated
Mar 30, 2026
Impact
The Pages route and legacy PublicAPI route for resending email verification links return distinguishable responses depending on whether the provided username exists and has an unverified email. This allows an unauthenticated attacker to enumerate valid usernames by observing different redirect targets. The existing
emailVerifySuccessOnInvalidEmailconfiguration option, which is enabled by default and protects the API route against this, did not apply to these routes.Patches
The email verification resend routes now respect the
emailVerifySuccessOnInvalidEmailoption. When set totrue(the default), both routes redirect to the success page regardless of the outcome, preventing user enumeration.Workarounds
There is no known workaround to prevent the information disclosure other than upgrading.
References