CVE-2026-32742 PUBLISHED

Parse Server session creation endpoint allows overwriting server-generated session fields

Assigner: GitHub_M
Reserved: 13.03.2026 Published: 18.03.2026 Updated: 18.03.2026

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (sessionToken, expiresAt, createdWith) when creating a session object via POST /classes/_Session. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a beforeSave trigger on the _Session class to validate and reject or strip any user-supplied values for sessionToken, expiresAt, and createdWith.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 4.3

Product Status

Vendor parse-community
Product parse-server
Versions
  • Version >= 9.0.0, < 9.6.0-alpha.17 is affected
  • Version < 8.6.42 is affected

References

Problem Types

  • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes CWE