Parse Server session creation endpoint allows overwriting server-generated session fields
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (sessionToken, expiresAt, createdWith) when creating a session object via POST /classes/_Session. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a beforeSave trigger on the _Session class to validate and reject or strip any user-supplied values for sessionToken, expiresAt, and createdWith.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | >= 9.0.0, < 9.6.0-alpha.17 | 9.6.0-alpha.17 |
parse-servernpm | < 8.6.42 | 8.6.42 |
Affected products
1- Range: >= 9.0.0, < 9.6.0-alpha.17
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-5v7g-9h8f-8pggghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32742ghsaADVISORY
- github.com/parse-community/parse-server/pull/10195ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/pull/10196ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-5v7g-9h8f-8pggghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.