Improperly Controlled Modification of Dynamically-Determined Object Attributes Affecting parse-server package, versions <8.6.42>=9.0.0-alpha.1 <9.6.0-alpha.17


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-PARSESERVER-15679882
  • published18 Mar 2026
  • disclosed17 Mar 2026
  • creditUnknown

Introduced: 17 Mar 2026

NewCVE-2026-32742  (opens in a new tab)
CWE-915  (opens in a new tab)

How to fix?

Upgrade parse-server to version 8.6.42, 9.6.0-alpha.17 or higher.

Overview

parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

Affected versions of this package are vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes via the POST /classes/_Session endpoint. An attacker can manipulate server-generated session fields such as sessionToken, expiresAt, and createdWith by supplying crafted values, potentially bypassing session expiration policies and setting predictable session tokens.

Workaround

This vulnerability can be mitigated by adding a beforeSave trigger on the _Session class to validate and reject or strip any user-supplied values for sessionToken, expiresAt, and createdWith.

References

CVSS Base Scores

version 4.0
version 3.1