Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32742: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-32742cvecve-2026-32742cwe-915
Published: Wed Mar 18 2026 (03/18/2026, 21:33:09 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (`sessionToken`, `expiresAt`, `createdWith`) when creating a session object via `POST /classes/_Session`. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a `beforeSave` trigger on the `_Session` class to validate and reject or strip any user-supplied values for `sessionToken`, `expiresAt`, and `createdWith`.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:05:22 UTC

Technical Analysis

CVE-2026-32742 affects parse-community's parse-server, an open-source backend framework for Node.js environments. The vulnerability is classified under CWE-915, indicating improper control over modification of dynamically-determined object attributes. In affected versions (>=9.0.0 and <9.6.0-alpha.17, and all versions below 8.6.42), authenticated users can exploit the session creation endpoint (POST /classes/_Session) to overwrite critical server-generated session fields: sessionToken, expiresAt, and createdWith. Normally, these fields are managed exclusively by the server to enforce session security policies, including expiration and token randomness. By overwriting expiresAt, an attacker can set a far-future expiration date, effectively bypassing session expiration and maintaining persistent access. Overwriting sessionToken with a predictable value undermines session token entropy, increasing the risk of session hijacking or fixation attacks. The vulnerability does not require user interaction beyond authentication and has no direct impact on confidentiality or availability but compromises session integrity. The flaw was addressed in parse-server versions 9.6.0-alpha.17 and 8.6.42 by filtering out these server-generated fields from user input during session creation. Until upgrading, a recommended mitigation is to implement a beforeSave trigger on the _Session class that validates or removes any user-supplied values for these fields, preventing unauthorized overwrites. No public exploits have been reported, but the vulnerability poses a risk to applications relying on parse-server for session management, especially those with sensitive user data or critical session-based access controls.

Potential Impact

The primary impact of CVE-2026-32742 is the compromise of session integrity in applications using vulnerable parse-server versions. Attackers with valid authentication can create sessions with manipulated expiration times, enabling indefinite session persistence and bypassing session timeout policies. This can facilitate unauthorized long-term access to user accounts or application resources. Additionally, predictable session tokens can increase the risk of session fixation or hijacking attacks, potentially allowing attackers to impersonate legitimate users. While confidentiality and availability are not directly affected, the integrity of session management is undermined, which can lead to privilege escalation or unauthorized actions within the application. Organizations relying on parse-server for critical backend services, especially those handling sensitive personal or financial data, face increased risk of account compromise and unauthorized access. The vulnerability's ease of exploitation (low complexity, authenticated user required) and the widespread use of parse-server in various industries amplify its potential impact. Failure to address this issue could result in data breaches, loss of user trust, and regulatory compliance violations related to session security.

Mitigation Recommendations

1. Upgrade parse-server to version 9.6.0-alpha.17 or later, or 8.6.42 or later, where the vulnerability is fixed by filtering out server-generated session fields from user input. 2. If immediate upgrade is not feasible, implement a beforeSave trigger on the _Session class to validate and reject or strip any user-supplied values for sessionToken, expiresAt, and createdWith fields, ensuring these cannot be overwritten by clients. 3. Review and audit session management logic to ensure no other endpoints or mechanisms allow manipulation of critical session attributes. 4. Enforce strong authentication and monitor session creation logs for anomalous patterns such as unusually long expiration times or repeated use of predictable session tokens. 5. Educate developers and administrators about the importance of server-side control over session attributes and the risks of improper attribute modification. 6. Conduct penetration testing focused on session management to verify that session tokens and expiration cannot be manipulated by authenticated users. 7. Apply strict input validation and sanitization on all client-supplied data related to session objects. 8. Monitor for updates or advisories from parse-community for any further patches or related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.629Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb2001771bdb1749c89321

Added to database: 3/18/2026, 9:58:25 PM

Last enriched: 3/26/2026, 1:05:22 AM

Last updated: 5/2/2026, 9:22:10 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses