Vulnerability Database

A comprehensive reference of security vulnerabilities found in Supabase, Firebase, and mobile BaaS applications. Each entry includes detection methods, impact analysis, and remediation steps.

SupabaseSupabase Vulnerabilities

Missing Row Level Security Policy

Tables without RLS are fully exposed to any user with the anon key, allowing unrestricted read and write access to all rows.

Critical

RLS Bypass: Unauthorized SELECT

Overly permissive SELECT policies allow users to read data they should not have access to, exposing sensitive information.

High

RLS Bypass: Unauthorized INSERT

Tables allow unauthenticated or cross-user inserts due to missing or overly permissive INSERT policies.

High

RLS Bypass: Unauthorized UPDATE

Tables allow unauthenticated or cross-user updates due to missing or overly permissive UPDATE policies.

High

RLS Bypass: Unauthorized DELETE

Tables allow unauthenticated or cross-user deletes due to missing or overly permissive DELETE policies.

High

Public Table Read Access

Tables are readable by anonymous users through the Supabase API, potentially exposing sensitive data to unauthenticated visitors.

Medium

Public Table Write Access

Tables are writable by anonymous users, allowing unauthenticated visitors to insert, update, or delete data.

High

Authenticated User Data Leak

Authenticated users can read other users' data due to SELECT policies that do not enforce row-level ownership checks.

Medium

Authenticated Cross-User Write Access

Authenticated users can modify or delete other users' data due to write policies lacking ownership checks.

High

Public Storage Bucket Exposure

Supabase storage buckets configured as public allow anyone to access uploaded files without authentication.

Medium

Listable Storage Bucket

Storage bucket contents can be enumerated by anonymous or authenticated users, revealing file names and structure.

Medium

Writable Storage Bucket

Storage bucket allows unauthenticated users to upload, overwrite, or delete files without any access control.

High

Unprotected RPC Function

PostgreSQL functions exposed via the Supabase RPC endpoint can be called without authentication or with insufficient authorization checks.

High

Edge Function Security Issue

Supabase Edge Functions lacking proper authentication checks, input validation, or error handling expose backend logic to abuse.

Medium

Service Role Key Exposure

The Supabase service_role key is exposed in client-side code, granting full database access that bypasses all RLS policies.

Critical

Anonymous Key Misuse

Supabase anon key used without proper RLS policies in place, allowing unauthenticated data access.

Low

FirebaseFirebase Vulnerabilities

MobileMobile Vulnerabilities

GeneralGeneral Vulnerabilities