CVE-2026-34574
Received Received - Intake
Session Immutability Bypass in Parse Server Allows Infinite Sessions

Publication date: 2026-03-31

Last updated on: 2026-04-02

Assigner: GitHub, Inc.

Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.69 and 9.7.0-alpha.14, an authenticated user can bypass the immutability guard on session fields (expiresAt, createdWith) by sending a null value in a PUT request to the session update endpoint. This allows nullifying the session expiry, making the session valid indefinitely and bypassing configured session length policies. This issue has been patched in versions 8.6.69 and 9.7.0-alpha.14.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
parseplatform parse-server From 9.0.0 (inc) to 9.7.0 (exc)
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server 9.7.0
parseplatform parse-server to 8.6.69 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-697 The product compares two entities in a security-relevant context, but the comparison is incorrect.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated user to bypass immutability protections on session fields such as expiresAt, enabling sessions to be valid indefinitely by nullifying session expiry. This can lead to unauthorized session persistence and potential privilege escalation.

Such unauthorized session manipulation could undermine security controls designed to limit session duration and access, which are important for compliance with standards like GDPR and HIPAA that require strict access control and session management to protect personal and sensitive data.

By allowing indefinite session validity, the vulnerability increases the risk of unauthorized access to protected data, potentially violating regulatory requirements for session expiration and user authentication controls.

The patch fixes this issue by enforcing strict validation to prevent null or falsy values from bypassing session field immutability, thereby helping maintain compliance with session management policies required by such standards.


Can you explain this vulnerability to me?

CVE-2026-34574 is a security vulnerability in Parse Server that allows an authenticated user to bypass the immutability protections on certain critical session fields such as expiresAt and createdWith. This is possible because the server improperly handles falsy values like null in session update requests. By sending a null value in a PUT request to the session update endpoint, an attacker can nullify the session expiry, effectively making the session valid indefinitely and bypassing configured session length policies.

The root cause is a flawed truthiness-based guard that fails to reject falsy values, allowing attackers to circumvent immutability checks. The vulnerability affects multiple session fields including expiresAt, createdWith, installationId, and sessionToken.

The issue has been fixed by replacing truthiness checks with explicit key-presence checks that reject any attempt to set these protected fields to null or other falsy values, thereby enforcing immutability as intended.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with authenticated access to manipulate session data in a way that bypasses session expiration controls.

  • An attacker can nullify the session expiry, making the session valid indefinitely.
  • This bypasses any configured session length policies, potentially allowing unauthorized prolonged access.
  • Attackers could also manipulate other protected session fields such as installationId and sessionToken, which could lead to session hijacking or privilege escalation.

Overall, the vulnerability compromises session integrity and security, increasing the risk of unauthorized access and abuse of user sessions.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an authenticated user sending a PUT request to the session update endpoint with null values for protected session fields such as expiresAt, createdWith, installationId, or sessionToken. Detection involves monitoring for such suspicious PUT requests attempting to modify these immutable session fields.

You can detect potential exploitation attempts by inspecting HTTP PUT requests to the /sessions/:objectId endpoint for payloads containing null or falsy values in these protected fields.

Example commands to detect such attempts might include using network traffic inspection tools or logs filtering for PUT requests with these fields set to null.

  • Using grep on server logs to find PUT requests with null values in protected fields: grep -i 'PUT /sessions/' /path/to/logfile | grep -E '"expiresAt":null|"createdWith":null|"installationId":null|"sessionToken":null'
  • Using a network packet capture tool like tcpdump or Wireshark to filter HTTP PUT requests to /sessions/ and inspect JSON payloads for null values in protected fields.
  • Implement application-level logging or monitoring to alert on PUT requests attempting to update expiresAt, createdWith, installationId, or sessionToken fields with null or falsy values.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade Parse Server to a patched version where this vulnerability is fixed: version 8.6.69 or later, or 9.7.0-alpha.14 or later.

If immediate upgrade is not possible, a possible workaround is to implement a beforeSave trigger on the _Session class that rejects any updates attempting to set expiresAt, createdWith, installationId, or sessionToken fields to null or other falsy values.

Additionally, monitor and restrict authenticated user access to session update endpoints to reduce the risk of exploitation.

  • Upgrade Parse Server to version 8.6.69, 9.7.0-alpha.14, or later where the fix is applied.
  • Implement a beforeSave trigger on the _Session class to reject null or falsy values for protected session fields.
  • Monitor logs and network traffic for suspicious PUT requests attempting to modify protected session fields.
  • Restrict or audit authenticated user permissions related to session updates.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart