CVE-2026-34574
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.69 and 9.7.0-alpha.14, an authenticated user can bypass the immutability guard on session fields (expiresAt, createdWith) by sending a null value in a PUT request to the session update endpoint. This allows nullifying the session expiry, making the session valid indefinitely and bypassing configured session length policies. This issue has been patched in versions 8.6.69 and 9.7.0-alpha.14.
Vendor
Product
CWE
Yayın Tarihi
2026-03-31 16:16:33
Güncelleme
2026-04-02 17:23:16
Source Identifier
security-advisories@github.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/parse-community/parse-server/commit/90802969fc713b7bc9733d7255c7519a6ed75d21
https://github.com/parse-community/parse-server/commit/ebccd7fe2708007e62f705ee1c820a6766178777
https://github.com/parse-community/parse-server/pull/10347
https://github.com/parse-community/parse-server/pull/10348
https://github.com/parse-community/parse-server/security/advisories/GHSA-f6j3-w9v3-cq22