Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (`sessionToken`, `expiresAt`, `createdWith`) when creating a session object via `POST /classes/_Session`. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a `beforeSave` trigger on the `_Session` class to validate and reject or strip any user-supplied values for `sessionToken`, `expiresAt`, and `createdWith`.
Published: 2026-03-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Session Expiration Bypass
Action: Immediate Patch
AI Analysis

Impact

Parse Server allows an authenticated user to overwrite server-generated session fields sessionToken, expiresAt and createdWith when creating a session via POST /classes/_Session. This vulnerability permits the attacker to set an arbitrary far-future expiration date, thereby bypassing the server's session expiration policy, and to assign a predictable session token value. The impact is a potential extension of session lifetime, which can undermine authentication controls and increase the window for session hijacking. This weakness is classified as CWE‑915: Improper Termination of Session.

Affected Systems

Affected product: parse-community:parse-server. Versions prior to 9.6.0-alpha.17 and 8.6.42 are vulnerable. The issue affects all releases listed in the CPE entries up to 9.6.0-alpha.16 and earlier 8.6.41 and below. System administrators should verify their installed version against the supplied CPE strings to determine exposure.

Risk and Exploitability

The CVSS score is 4.3, indicating moderate severity. The EPSS score is less than 1%, and the vulnerability is not currently marked in CISA's KEV catalog. Exploitation requires an authenticated user with permission to create a session. The attacker must send a POST request to /classes/_Session including the fields sessionToken, expiresAt and createdWith. Because the API accepts these values when the server is running a vulnerable version, an attacker can easily bypass expiration controls and set a predictable token, which can be leveraged for prolonged unauthorized access. Administrative effort to mitigate is low, but if an attacker establishes a long-lived session, they could abuse the privileges associated with that session for an extended period.

Generated by OpenCVE AI on March 19, 2026 at 18:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Parse Server to version 9.6.0‑alpha.17 or later (or 8.6.42 or later).
  • Add a beforeSave trigger on the _Session class that validates and rejects or strips any user-supplied values for sessionToken, expiresAt, and createdWith.

Generated by OpenCVE AI on March 19, 2026 at 18:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5v7g-9h8f-8pgg Parse Server session creation endpoint allows overwriting server-generated session fields
History

Fri, 20 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Parseplatform
Parseplatform parse-server
CPEs cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha10:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha11:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha12:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha13:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha14:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha15:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha16:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha8:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha9:*:*:*:node.js:*:*
Vendors & Products Parseplatform
Parseplatform parse-server

Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Parse Community
Parse Community parse Server
Vendors & Products Parse Community
Parse Community parse Server

Wed, 18 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (`sessionToken`, `expiresAt`, `createdWith`) when creating a session object via `POST /classes/_Session`. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a `beforeSave` trigger on the `_Session` class to validate and reject or strip any user-supplied values for `sessionToken`, `expiresAt`, and `createdWith`.
Title Parse Server session creation endpoint allows overwriting server-generated session fields
Weaknesses CWE-915
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Parse Community Parse Server
Parseplatform Parse-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:11:49.441Z

Reserved: 2026-03-13T15:02:00.629Z

Link: CVE-2026-32742

cve-icon Vulnrichment

Updated: 2026-03-20T17:10:57.716Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T22:16:25.183

Modified: 2026-03-19T17:34:20.310

Link: CVE-2026-32742

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:52:05Z

Weaknesses