GHSA-q6wc-xx4m-92fj: Improper Authorization in PowerSync Service Sync Streams
Vulnerability ID: GHSA-Q6WC-XX4M-92FJ
CVSS Score: 6.5
Published: 2026-03-07
A critical logic error in PowerSync Service version 1.20.0 causes the synchronization engine to ignore specific subquery filters when using the config.edition: 3 architecture. This flaw results in an authorization bypass where authenticated users may receive data intended solely for privileged accounts, such as administrators.
TL;DR
PowerSync Service 1.20.0 ignores certain WHERE clause filters in sync streams when using config.edition: 3. Authenticated users can unintentionally sync restricted data if access is controlled via non-partitioning subqueries. Patched in version 1.20.1.
Technical Details
- CWE ID: CWE-285
- Attack Vector: Network
- CVSS Score: 6.5 (Medium)
- Impact: High Confidentiality Loss
- Component: @powersync/service-core
- Exploit Status: No Active Exploitation Known
Affected Systems
- PowerSync Service (Self-Hosted)
- PowerSync Service Core (npm)
-
@powersync/service-core: = 1.20.0 (Fixed in:
1.20.1) -
@powersync/service-sync-rules: <= 0.32.0 (Fixed in:
0.33.0)
Mitigation Strategies
- Software Update
- Configuration Rollback
Remediation Steps:
-
Upgrade PowerSync Service: Update the
@powersync/service-corepackage to version1.20.1or later. -
Upgrade Sync Rules: Update the
@powersync/service-sync-rulespackage to version0.33.0or later. -
Verify Configuration: If immediate patching is not possible, revert the configuration to
config.edition: 2(if supported by your specific implementation) to use the legacy sync engine which is not affected. - Restart Service: A restart is required to load the new code. No database migrations or manual data cleanup is required on the server side.
- Client Reconciliation: Clients connecting to the patched service will automatically undergo reconciliation. Data that was synced erroneously will be removed from the local device database by the PowerSync protocol.
References
Read the full report for GHSA-Q6WC-XX4M-92FJ on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)