Critical Lovable Low-Code Flaw Exposes User Data (CVE-2025-48757)

Lovable low-code platform vulnerability CVE-2025-48757 allows attackers to bypass RLS and access sensitive user data. Update now to mitigate risk.
critical-lovable-low-code-flaw-exposes-user-data-cve-2025-48757 critical-lovable-low-code-flaw-exposes-user-data-cve-2025-48757

A critical vulnerability in the popular Lovable low-code platform has left hundreds of projects exposed to data breaches and malicious attacks. The flaw, identified as CVE-2025-48757, allows remote unauthenticated attackers to bypass Row-Level Security (RLS) policies and access sensitive user information, including personally identifiable information (PII) and credentials.

The vulnerability, discovered by security researcher Matt Palmer on March 20, 2025, affects all Lovable versions through April 15, 2025. With a severe CVSS score of 9.3, the flaw stems from misaligned RLS policies between frontend logic and backend enforcement in Lovable’s client-heavy architecture, which relies on platforms like Supabase for authentication and data storage.

Hacker accessing sensitive data on a computer
Source: Pexels Image

The attack vector is particularly alarming as it allows threat actors to bypass client-side authentication checks by modifying network queries, exposing full tables of user data. This security breakdown impacts high-profile sites like Linkable, a platform that auto-generates websites from LinkedIn profiles, putting countless users’ personal information at risk.

According to Palmer, “Applications developed using its platform often lack secure RLS configurations, allowing unauthorized actors to access sensitive user data and inject malicious data.” The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory urging organizations using Lovable to update their applications and review RLS policies to mitigate the risk of data exposure and malicious attacks.

As low-code platforms gain popularity for their ease of use and rapid application development, this vulnerability highlights the critical importance of proper security configurations and thorough testing. Developers and organizations must prioritize security best practices, including secure authentication, granular access controls, and regular security audits, to protect sensitive user data from falling into the wrong hands.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use