Parse Server session creation endpoint allows overwriting server-generated session fields
Moderate severity
GitHub Reviewed
Published
Mar 16, 2026
in
parse-community/parse-server
•
Updated Mar 19, 2026
Package
Affected versions
>= 9.0.0, < 9.6.0-alpha.17
< 8.6.42
Patched versions
9.6.0-alpha.17
8.6.42
Description
Published to the GitHub Advisory Database
Mar 17, 2026
Reviewed
Mar 17, 2026
Published by the National Vulnerability Database
Mar 18, 2026
Last updated
Mar 19, 2026
Impact
An authenticated user can overwrite server-generated session fields (
sessionToken,expiresAt,createdWith) when creating a session object viaPOST /classes/_Session. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value.Patches
The session creation endpoint now filters out server-generated fields from user-supplied data, preventing them from being overwritten.
Workarounds
Add a
beforeSavetrigger on the_Sessionclass to validate and reject or strip any user-supplied values forsessionToken,expiresAt, andcreatedWith.References