Parse Server has a session field immutability bypass via falsy-value guard
Moderate severity
GitHub Reviewed
Published
Mar 29, 2026
in
parse-community/parse-server
•
Updated Apr 1, 2026
Package
Affected versions
>= 9.0.0, < 9.7.0-alpha.14
< 8.6.69
Patched versions
9.7.0-alpha.14
8.6.69
Description
Published by the National Vulnerability Database
Mar 31, 2026
Published to the GitHub Advisory Database
Apr 1, 2026
Reviewed
Apr 1, 2026
Last updated
Apr 1, 2026
Impact
An authenticated user can bypass the immutability guard on session fields (
expiresAt,createdWith) by sending a null value in a PUT request to the session update endpoint. This allows nullifying the session expiry, making the session valid indefinitely and bypassing configured session length policies.Patches
The truthiness-based guard checks were replaced with key-presence checks that reject any value for protected session fields, including null.
Workarounds
There is no known workaround. A
beforeSavetrigger on_Sessioncould be used to reject null values forexpiresAtandcreatedWith.References