CVE-2026-34574 PUBLISHED

Parse Server: Session field immutability bypass via falsy-value guard

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 31.03.2026 Updated: 31.03.2026

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.69 and 9.7.0-alpha.14, an authenticated user can bypass the immutability guard on session fields (expiresAt, createdWith) by sending a null value in a PUT request to the session update endpoint. This allows nullifying the session expiry, making the session valid indefinitely and bypassing configured session length policies. This issue has been patched in versions 8.6.69 and 9.7.0-alpha.14.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor parse-community
Product parse-server
Versions
  • Version < 8.6.69 is affected
  • Version >= 9.0.0, < 9.7.0-alpha.14 is affected

References

Problem Types

  • CWE-697: Incorrect Comparison CWE