CVE-2026-33527: Parse Server's Session Update endpoint allows overwriting server-generated session fields
(updated )
An authenticated user can overwrite server-generated session fields such as expiresAt and createdWith when updating their own session via the REST API. This allows bypassing the server’s configured session lifetime policy, making a session effectively permanent.
References
- github.com/advisories/GHSA-jc39-686j-wp6q
- github.com/parse-community/parse-server
- github.com/parse-community/parse-server/commit/26b628c8fb3cc79ea955374769eebcff6f8a8a73
- github.com/parse-community/parse-server/commit/ea68fc0b22a6056c9675149469ff57817f7cf984
- github.com/parse-community/parse-server/pull/10263
- github.com/parse-community/parse-server/pull/10264
- github.com/parse-community/parse-server/security/advisories/GHSA-jc39-686j-wp6q
- nvd.nist.gov/vuln/detail/CVE-2026-33527
Code Behaviors & Features
Detect and mitigate CVE-2026-33527 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →