api leak exposes user accounts

A notable security incident has emerged following the exposure of over 50,000 Azure Active Directory (AD) user records because of a hardcoded, unsecured API endpoint embedded within a JavaScript file. This incident, reported by CloudSEK’s BeVigil platform, reveals critical vulnerabilities within an organization in the aviation industry, raising alarms regarding infrastructure security.

The improperly secured API endpoint, which was publicly accessible and required no authentication, continuously leaked sensitive information for both existing and newly onboarded users. The hardcoded API was included in a JavaScript bundle utilized by a web application. This flaw permitted the issuance of Microsoft Graph API tokens that carried heightened permission levels, particularly User.Read.All and AccessReview.Read.All. These permissions allowed access to extensive user profiles and identity governance data, exposing details such as names, job titles, email addresses, and contact information, contributing to the risk of social engineering attacks. Notably, this exposure stems from a vulnerability identified on May 30, 2025, and a hardcoded endpoint provided access to sensitive data without authentication, greatly escalating concerns about potential targeted attacks against high-profile individuals.

The unsecured API endpoint leaked sensitive information continuously, impacting both existing and new users alike.

The ramifications of the exposure extend beyond mere data visibility; they encompass severe security and compliance risks. Cybercriminals now possess a widened attack surface, with opportunities for privilege escalation, identity theft, and sophisticated phishing campaigns on the table. With social engineering attacks contributing to 98% of cyberattacks, the exposed user information presents a significant threat to organizational security.

The likely violations of data privacy regulations, including GDPR and CCPA, may ensue, given the extensive exposure of personally identifiable information. Organizations managing sensitive identity data face intense scrutiny and potential fines because of the failure to protect API tokens and user information adequately.

From a technical perspective, the improper exposure of such tokens facilitates unauthorized, automated data harvesting from the Azure AD directory. The absence of authentication on the token-issuing endpoint undermines standard security protocols expected for the Microsoft Graph API, a stark reminder of the consequences that arise from overlooking basic security configurations.

The incident underlines a critical need for strong security practices in managing identity data.

You May Also Like

Safari’s Fullscreen Flaw Lets Hackers Hijack Browsers Without Users Noticing

Safari’s fullscreen vulnerability poses a hidden threat to user privacy—could your sensitive data be at risk? Learn how to protect yourself now.

Massive Data Leak Hits Netflix and More—Are Your Login Credentials Already Out There?

Over 7 million streaming accounts compromised in a breathtaking data breach. Are your login credentials among them? Your online safety may depend on it.

Victoria’s Secret Website Pulled Offline Amid Mysterious Security Breach During Major Sales Rush

Victoria’s Secret faces a major sales setback as a mysterious security breach halts their website. Is the company’s future in jeopardy? Find out more.

LexisNexis Data Breach Hits 364,000: Sensitive Info Leaked via Third-Party Development Platform

A staggering data breach exposing 364,000 individuals reveals vulnerabilities in consumer privacy. How will this reshape the future of data protection?