alt.hn

4/14/2026 at 6:56:40 PM

Tell HN: Fiverr left customer files public and searchable

by morpheuskafka

4/14/2026 at 10:22:56 PM

Software development jobs are too accessible. Jobs with access to/control over millions of people's data should require some kind of genuine software engineering certification, and there should be business-cratering fines for something as egregious as completely ignoring security reports. It is ridiculous how we've completely normalised leaks like this on a weekly or almost-daily basis.

by applfanboysbgon

4/14/2026 at 10:25:52 PM

They may be part of it, but as a publicly traded company, there's got to be a at least a few people there with a fancy pedigree (not that that actually means they are good at their job or care). But if such a test existed, they presumably would have passed it.

They also have an ISO 27001 certificate (they try to claim a bunch of AWSs certs by proxy on their security page, which is ironic as they say AWS stores most of their data while apparently all uploads are on this).

by morpheuskafka

4/14/2026 at 10:07:33 PM

That's wild. Thousands of SSNs in there. Also a lot of Fiverr folks selling digital products and all their PDF courses are being returned for free in the search results.

by qingcharles

4/14/2026 at 10:22:11 PM

Hopefully this can be patched soon.

Their robots file specifically has the code to disallow search engine crawling commented out - https://fiverr-res.cloudinary.com/robots.txt.

---

     See http://www.robotstxt.org/wc/norobots.html for documentation on how to use the robots.txt file
     #
     # To ban all spiders from the entire site uncomment the next two lines:
     # User-Agent: \*
     # Disallow: /

by tfsh

4/14/2026 at 7:15:11 PM

You followed the correct reporting instructions.

https://www.fiverr.com/.well-known/security.txt only has "Contact: security@fiverr.com" and in their help pages they say "Fiverr operates a Bug Bounty program in collaboration with BugCrowd. If you discover a vulnerability, please reach out to security@fiverr.com to receive information about how to participate in our program."

by mtmail

4/14/2026 at 10:02:26 PM

really bad stuff in the results. very easy to find API tokens, penetration test reports, confidental PDFs, internal APIs. Fiverr needs to immediately block all static asset access until this is resolved. business continuity should not be a concern here.

by janoelze

4/14/2026 at 10:04:14 PM

lots of admin credentials too, which have probably never been changed

by mpeg

4/14/2026 at 10:13:27 PM

admin passwords to dating sites, that's the stuff people get blackmailed with

by janoelze

4/14/2026 at 7:28:01 PM

Wow, surprised this isn't blowing up more. Leaking form 1040s is egregious, let alone getting them indexed by Google...

by wxw

4/14/2026 at 10:12:56 PM

I wrote to Cloudinary for what it's worth. This is brutal.

by gregsadetsky

4/14/2026 at 9:44:33 PM

Probably not in scope but maybe https://bugcrowd.com/engagements/cloudinary will care?

This is bad.

by johnmlussier

4/14/2026 at 9:52:02 PM

They probably wouldn't act immediately as there's no way for them to enable signing without breaking their client's site. The only cleanup you could do without that would be having google pull that subdomain I guess?

(Fiverr itself uses Bugcrowd but is private, having to first email their SOC as I did.)

by morpheuskafka

4/14/2026 at 9:29:44 PM

This is crazy! So many tax and other financial forms out in the open. But the most interesting file I’ve seen so far seems to be a book draft titled “HOOD NIGGA AFFIRMATIONS: A Collection of Affirming Anecdotes for Hood Niggas Everywhere”. I made it to page 27 out of 63.

by impish9208

4/14/2026 at 10:31:53 PM

Link please :pray:

by sergiotapia

4/14/2026 at 9:37:47 PM

I've read worse. Better than Dan Brown!

by onraglanroad

4/14/2026 at 10:27:24 PM

that bar is subterranean, haha

by b00ty4breakfast

4/14/2026 at 8:00:28 PM

Woah that's brutal all the important information is wild in public

by mraza007

4/14/2026 at 10:24:09 PM

This is really bad, just straight up people's income, SSN and worse just right there in the search results on Brave Search even.

by sergiotapia

4/14/2026 at 10:20:35 PM

this is a bad leak, appreciate the attempts at disclosure before this

by yieldcrv

4/14/2026 at 9:15:12 PM

They bought and.co and then dropped it. strange company

by smashah

4/14/2026 at 9:06:36 PM

Burn it to the ground.

by popalchemist

4/14/2026 at 10:13:16 PM

> Moreover, it seems like they may be serving public HTML somewhere that links to these files. As a result, hundreds are in Google search results, many containing PII

This is not how Google works.

by walletdrainer

4/14/2026 at 10:31:44 PM

It kind of is, though. Google doesn't randomly try to visit every URL on the internet. It follows links. Therefore, for these files to be indexed by Google, they need to be linked to from somewhere.

by AndroTux

4/14/2026 at 8:58:31 PM

Just by scrolling over it that's really rough.

by BoredPositron

4/14/2026 at 9:19:22 PM

Loooool what a mess

by iwontberude