PT-2026-25982 · Npm · Parse Server
Published
2026-03-17
·
Updated
2026-03-17
·
CVE-2026-32742
CVSS v3.1
4.3
| Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
Impact
An authenticated user can overwrite server-generated session fields (
sessionToken, expiresAt, createdWith) when creating a session object via POST /classes/ Session. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value.Patches
The session creation endpoint now filters out server-generated fields from user-supplied data, preventing them from being overwritten.
Workarounds
Add a
beforeSave trigger on the Session class to validate and reject or strip any user-supplied values for sessionToken, expiresAt, and createdWith.Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Parse Server