Tax returns and ID cards

Fiverr data leak: Private documents exposed on Google

Fiverr
Facebook
X
LinkedIn
Reddit
WhatsApp
Image source: Jess Rodriguez/Shutterstock.com

A misconfigured Cloudinary instance is leaking private user documents from the freelance platform, which are being indexed by Google. The researcher who discovered the issue has been waiting for a response from the company for over 40 days.

Anyone entering the right search terms on Google can currently find sensitive Fiverr user documents in plain text: completed tax returns, ID cards, invoices, API credentials and passwords. The culprit is a misconfigured instance of the cloud service Cloudinary, which the gig platform uses to exchange files between clients and freelancers.

Ad

The problem was uncovered by an anonymous security researcher posting under the alias morpheuskafka on Hacker News. According to the researcher, Fiverr uses Cloudinary similarly to an S3 storage service, delivering files directly to web browsers. The critical mistake: instead of using signed, expiring URLs, Fiverr apparently opted for public links that can easily be crawled and indexed by search engines.

What is affected

The scale of the leak is significant. Cybernews confirmed that search results from affected servers do indeed expose tax returns, ID documents, invoices and other personally identifiable information. Alongside private documents, deliverables from freelancers also surfaced, ranging from marketing materials and pitch decks to academic theses and penetration test reports. Ironically, among the leaked files is Fiverr’s own ISO 27001 certificate for information security excellence, which expired four months ago.

Security researcher Aras Nazarovas from Cybernews is unambiguous in his assessment: this constitutes a serious security failure. All files exchanged between buyers and sellers, including ID documents, contracts, passwords and API keys, are potentially publicly accessible. While external attackers cannot simply list all affected files without an account API key, anyone who knows what to search for will find results on Google.

Ad

Responsible disclosure ignored

Particularly troubling: the researcher claims to have notified Fiverr of the vulnerability more than 40 days ago, via email to the official security address security@fiverr.com. No reply was ever received. Since the issue is technically not a classic code vulnerability, the researcher saw no way to escalate it through CVE or CERT processes and therefore decided to go public.

Nazarovas also points out that Fiverr itself actively runs Google Ads targeting tax-related keywords, directing users to its platform. Without adequate security measures in place, the company may be in violation of the Gramm-Leach-Bliley Act (GLBA) and the FTC Safeguards Rule, both of which require tax preparers to protect client financial data.

What affected users should do now

Anyone who has ever shared credentials, API keys or other sensitive information via Fiverr messages should rotate them immediately. Nazarovas also recommends staying alert for signs of identity fraud or phishing attempts.

The researcher is calling on Fiverr to immediately implement proper access controls for private files, remove affected content from search engine indexes and notify impacted users. At the time the original report was published, the data remained freely accessible. Fiverr has so far not commented.

Lars

Becker

Stellvertretender Chefredakteur

IT Verlag GmbH

Ad

Weitere Artikel