Parse Server's Session Update endpoint allows overwriting server-generated session fields
- Severity:
- Medium
Description
An authenticated user can overwrite server-generated session fields such as expiresAt and createdWith when updating their own session via the REST API. This allows bypassing the server’s configured session lifetime policy, making a session effectively permanent.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.57 >= 9.0.0, < 9.6.0-alpha.48** Patched version(s): **8.6.57 9.6.0-alpha.48**
References
Related Issues
- Parse Server session creation endpoint allows overwriting server-generated session fields - CVE-2026-32742
- parse-server's endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user - CVE-2026-30229
- Parse Server vulnerable to user enumeration via email verification endpoint - CVE-2026-31901
- Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause - CVE-2026-32098
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 24, 2026