Researchers Say Fiverr Left User Files Open to Google Search
Fiverr exposed thousands of user files including tax records and IDs via misconfigured Cloudinary storage indexed by
Summary
Security researcher Morpheuskafka discovered that thousands of private Fiverr user documents—including tax forms, IDs, and work contracts—were exposed through Google search results due to misconfigured Cloudinary storage using public URLs instead of signed/expiring URLs. The sensitive data included tax records, passwords, API keys, and identity documents. Fiverr denied this was a security breach, claiming users consented to file sharing, but cybersecurity experts argue the public indexing violated user intent and exposed regulated data to unauthorized access.
Full text
Security Leaks PrivacyResearchers Say Fiverr Left User Files Open to Google Search Private Fiverr user documents, including tax records and IDs, were reportedly found in Google search results due to a storage configuration issue. Read more about the findings and the company’s response to the data exposure. byDeeba AhmedApril 16, 20263 minute read A security researcher named Morpheuskafka has found that thousands of private files from the Tel Aviv-based gig-work website Fiverr were left open for anyone to view online. The leaked data allegedly includes very sensitive items like tax forms, photos of driving licences, and work contracts. These documents were not stored on a private, restricted server but were actually indexed and appeared in Google search results. How the Data Was Exposed Fiverr uses a third-party service called Cloudinary to manage and store the images and PDFs that users send to each other. And, instead of using signed or expiring URLs that only authorised users could open, the platform, reportedly, used public URLs. Researcher on HN explaining the issue Since some of these links were placed on public pages, search engines were able to crawl and list them, which is why a simple search could bring up a user’s personally identifiable information (PII). The types of data found include: Official ID cards and driving licences Private work deliverables and contracts Passwords and API keys used for software Tax records and invoices containing physical addresses Morpheuskafka first spotted the problem and notified Fiverr’s security team via email around 40 days before making the news public, but the company didn’t reply. Interestingly, it was found that Fiverr even paid for Google Ads for keywords like “form 1040 filing,” even though these specific tax forms were among the files that were not properly secured. Snippit of the exposed files on Google (Image credit: Hackread.com) Fiverr Denies a Security Breach Fiverr has categorically denied the claim, stating that this is not a cyberattack or a security incident because users gave their permission for these files to be shared as part of their work. A spokesperson for the firm said: “Fiverr does not proactively expose users’ private information. The content in question was shared by users in the normal course of marketplace activity to showcase work samples, under agreements and approvals between buyers and sellers.” However, cybersecurity experts disagree with this view. They argue that even if a user agrees to share a file with one client, it does not mean they want it to be public for everyone to find. Experts suggest that anyone who has shared their ID or tax forms on the site should monitor their accounts for signs of identity theft. It is also a good idea to change any login credentials that were sent through the platform’s messaging system. Expert View on Data Handling In a comment shared with Hackread.com, David Stuart, Cybersecurity Evangelist, Sentra, explained that this situation is a classic example of how sensitive data can spread and be handled incorrectly. He said: “Fiverr’s incident is a textbook case of sensitive data sprawl and misconfigured third-party infrastructure: highly sensitive documents (including tax returns, IDs, health records, and even admin credentials) were stored on Cloudinary behind unauthenticated, non-expiring URLs, then surfaced via public HTML so Google could index them, remaining accessible for weeks after initial disclosure and hours after public reporting.” According to Stuart, the issue was not a complex hack but a simple failure to use the right safety settings. “This isn’t a zero-day exploit; it’s a failure to understand where regulated data lives, how it rapidly proliferates and is shared across services, and whether controls like signed URLs, authentication, and proper indexing rules are actually in place,” he noted. He suggested that companies need to be better at finding and categorising the private data they hold to prevent these “unlocked door” leaks. He added that security teams must be able to: “Identify when business workflows push regulated content into the wrong systems, prioritize remediation before search engines or adversaries find it, and demonstrate that these risks are being monitored continuously as data environments expand.” Deeba Ahmed Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage. View Posts CloudinaryCybersecurityFiverrFreelancingGooglePrivacy Leave a Reply Cancel reply View Comments (0) Related Posts Read More Security Cisco Web UI Vulnerability Exploited Massly, Impacting Over 40K Devices It is unclear how long Cisco will take to release a patch. byDeeba Ahmed News Security Technology High severity Intel chip flaw left cars, medical and IoT devices vulnerable A vulnerability in Intel CPUs allowed an attacker with physical access to a device to gain enhanced privileges on the system. byDeeba Ahmed Security Android Malware Android Malware in gaming apps on Play Store downloaded 4 million times Just another day with just another Android malware targeting unsuspecting users on Google Play Store. This time, the… byWaqas Security Life-saving Pacemakers, Defibrillators Can Be Hacked and Turned Off Pacemakers and implantable cardioverter defibrillators (ICDs) are lifesaving devices but malicious actors can exploit vulnerabilities and result of it… byWaqas