Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30870: CWE-285: Improper Authorization in powersync-ja powersync-service

0
Medium
VulnerabilityCVE-2026-30870cvecve-2026-30870cwe-285
Published: Mon Mar 09 2026 (03/09/2026, 22:31:40 UTC)
Source: CVE Database V5
Vendor/Project: powersync-ja
Product: powersync-service

Description

PowerSync Service is the server-side component of the PowerSync sync engine. In version 1.20.0, when using new sync streams with config.edition: 3, certain subquery filters were ignored when determining which data to sync to users. Depending on the sync stream configuration, this could result in authenticated users syncing data that should have been restricted. Only queries that gate synchronization using subqueries without partitioning the result set are affected. This vulnerability is fixed in 1.20.1.

AI-Powered Analysis

AILast updated: 03/09/2026, 23:04:17 UTC

Technical Analysis

CVE-2026-30870 is a security vulnerability classified under CWE-285 (Improper Authorization) found in the PowerSync Service, a server-side component of the PowerSync sync engine, specifically in versions prior to 1.20.1. The issue occurs when using new sync streams configured with config.edition set to 3. In this configuration, certain subquery filters intended to restrict data synchronization are ignored if those subqueries do not partition the result set. This flaw allows authenticated users to synchronize data beyond their authorized scope, potentially exposing sensitive or restricted information. The vulnerability does not affect all sync queries but is limited to those gating synchronization via subqueries without result set partitioning. Exploitation requires the attacker to be authenticated but does not require user interaction, and the attack can be performed remotely over the network. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact, no integrity or availability impact, low attack complexity, and requiring privileges. The vulnerability was publicly disclosed on March 9, 2026, and fixed in version 1.20.1 of the PowerSync Service. No known exploits have been reported in the wild to date.

Potential Impact

The primary impact of CVE-2026-30870 is unauthorized data exposure due to improper authorization checks in the synchronization process. Authenticated users with limited permissions may gain access to sensitive or restricted data that should not be synchronized to them. This can lead to confidentiality breaches, potentially exposing proprietary, personal, or regulated information depending on the data managed by the PowerSync Service. Since the vulnerability does not affect data integrity or availability, the risk is confined to unauthorized data disclosure. Organizations relying on PowerSync Service for data synchronization may face compliance violations, reputational damage, and increased risk of insider threats or lateral movement by malicious actors exploiting this flaw. The ease of exploitation (low complexity, no user interaction) and remote attack vector increase the risk profile, especially in environments with many authenticated users or where privilege separation is critical.

Mitigation Recommendations

To mitigate CVE-2026-30870, organizations should immediately upgrade the PowerSync Service to version 1.20.1 or later, where the vulnerability is patched. In addition to patching, administrators should audit sync stream configurations, especially those using config.edition 3, to ensure that subquery filters are correctly applied and that synchronization queries partition result sets appropriately. Implement strict access controls and monitor synchronization logs for unusual data sync patterns that may indicate exploitation attempts. Employ network segmentation and limit access to the PowerSync Service to trusted users and systems only. Where possible, enforce the principle of least privilege for authenticated users to minimize potential data exposure. Finally, maintain an incident response plan to quickly address any suspected data leaks stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-06T00:04:56.698Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af4e6aea502d3aa8cf7ccc

Added to database: 3/9/2026, 10:49:14 PM

Last enriched: 3/9/2026, 11:04:17 PM

Last updated: 3/13/2026, 7:48:18 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses