telexed ~ c / 33b2e340-b61radar:40 · infra_saasLIVE
← back
NO.
#33b2e340
Topic
INFRA & SAAS
Source
Hacker News · MRR
Published
2026-04-14 18:56:40
Importance
★ 4/10 — radar 40

`Fiverr` exposed customer files via public `Cloudinary` URLs

Sensitive client-worker files were served with public Cloudinary links and ended up indexed in Google, including tax forms and other PII. If uploads can contain anything regulated, unsigned asset URLs are a straight production risk, not a convenience tradeoff.

[ KEY POINTS ]
  1. Cloudinary was used like object storage for PDFs/images in messages, but Fiverr chose public URLs over signed or expiring links.
  2. Search results reportedly surfaced hundreds of exposed files, and example queries included tax-document terms such as form 1040.
  3. The report says notice went to security@fiverr.com and 40 days passed without reply, which is its own vendor-risk signal.
  4. The practical takeaway is simple: treat file delivery paths like auth surfaces, especially when uploads may contain PII, contracts, or financial docs.
Originalnews.ycombinator.com/item?id=47769796Read original →

// related