Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (`sessionToken`, `expiresAt`, `createdWith`) when creating a session object via `POST /classes/_Session`. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a `beforeSave` trigger on the `_Session` class to validate and reject or strip any user-supplied values for `sessionToken`, `expiresAt`, and `createdWith`.
References
| Link | Resource |
|---|---|
| https://github.com/parse-community/parse-server/pull/10195 | Issue Tracking |
| https://github.com/parse-community/parse-server/pull/10196 | Issue Tracking |
| https://github.com/parse-community/parse-server/security/advisories/GHSA-5v7g-9h8f-8pgg | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Mar 2026, 17:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/parse-community/parse-server/pull/10195 - Issue Tracking | |
| References | () https://github.com/parse-community/parse-server/pull/10196 - Issue Tracking | |
| References | () https://github.com/parse-community/parse-server/security/advisories/GHSA-5v7g-9h8f-8pgg - Vendor Advisory | |
| CPE | cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha11:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha14:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha13:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha10:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha7:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha16:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha8:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha9:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha12:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha15:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.6.0:alpha4:*:*:*:node.js:*:* |
|
| First Time |
Parseplatform
Parseplatform parse-server |
18 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 22:16
Updated : 2026-03-19 17:34
NVD link : CVE-2026-32742
Mitre link : CVE-2026-32742
CVE.ORG link : CVE-2026-32742
JSON object : View
Products Affected
parseplatform
- parse-server
CWE
CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes
