CVE-2026-34574

medium

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.69 and 9.7.0-alpha.14, an authenticated user can bypass the immutability guard on session fields (expiresAt, createdWith) by sending a null value in a PUT request to the session update endpoint. This allows nullifying the session expiry, making the session valid indefinitely and bypassing configured session length policies. This issue has been patched in versions 8.6.69 and 9.7.0-alpha.14.

References

https://github.com/parse-community/parse-server/security/advisories/GHSA-f6j3-w9v3-cq22

https://github.com/parse-community/parse-server/pull/10348

https://github.com/parse-community/parse-server/pull/10347

https://github.com/parse-community/parse-server/commit/ebccd7fe2708007e62f705ee1c820a6766178777

https://github.com/parse-community/parse-server/commit/90802969fc713b7bc9733d7255c7519a6ed75d21

Details

Source: Mitre, NVD

Published: 2026-03-31

Updated: 2026-04-02

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00045