Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notion Public Pages Expose Editor Information

Notion Public Pages Expose Editor Information

Posted on April 20, 2026 By CWS

Notion, a widely used platform for productivity and collaboration, is currently facing significant scrutiny from the cybersecurity sector. The platform’s public pages have been found to leak sensitive information about their editors, raising serious privacy concerns.

Exposure of Personal Information

Researchers in the field of cybersecurity have discovered that public Notion pages inadvertently disclose personally identifiable information (PII) of all individuals who have edited them. This includes details such as full names, email addresses, and profile photos. The exposure of such data poses a substantial risk to organizations using Notion for public documentation.

Vulnerability in Notion’s Data Handling

The root of this issue lies in the way Notion manages user information within public workspaces. When a document is made publicly accessible, editor UUIDs are embedded in the page’s block permissions. These identifiers can be accessed without any authentication, making them vulnerable to exploitation by threat actors and open-source intelligence (OSINT) researchers.

With these UUIDs, attackers can send a single unauthenticated POST request to Notion’s internal API endpoint. Due to the lack of access controls for public page data, this endpoint can return complete user profiles associated with these identifiers, including names, emails, and profile photos.

Longstanding Issue and Community Response

This vulnerability has been known for some time. Security researchers reported the issue through the HackerOne bug bounty program in July 2022. However, Notion categorized the report as merely informative and did not address the vulnerability structurally, leaving it unpatched.

The issue has recently gained attention on social media, leading to widespread criticism from developers and cybersecurity experts. The community’s frustration stems from the fact that this vulnerability, ignored for nearly four years, exposes countless indexed pages to potential data scraping.

Notion’s Acknowledgment and Future Plans

In response to the backlash, Notion has acknowledged the problem and is working on a solution. Max Schoening, a representative for Notion, stated that the platform is considering architectural changes to eliminate PII from public-facing endpoints or to implement an email proxy system to protect user data.

Until such measures are in place, organizations using Notion for public resources should exercise caution, as their employee contact information might already be vulnerable to scraping tools. Keeping abreast of developments in this area is crucial for ensuring data security.

Stay informed by following our updates on Google News, LinkedIn, and X. Contact us to share your stories and insights.

Cyber Security News Tags:API vulnerability, Cybersecurity, data breach, data protection, HackerOne, Notion, online privacy, OSINT, phishing risk, PII exposure, Privacy, public pages, security vulnerability, tech news

Post navigation

Previous Post: Vercel Confirms Intrusion After Hacker’s Data Sale Offer
Next Post: Millions of FTP Servers Remain Unencrypted, Report Finds

Related Posts

Critical Malware Alert for Popular Linux Compression Tool Critical Malware Alert for Popular Linux Compression Tool Cyber Security News
Interlock Ransomware Utilizes Zero-Day to Evade Security Interlock Ransomware Utilizes Zero-Day to Evade Security Cyber Security News
Network Security Checklist – 2026 Network Security Checklist – 2026 Cyber Security News
Microsoft Integrated Azure Firewall With AI-powered Security Copilot Microsoft Integrated Azure Firewall With AI-powered Security Copilot Cyber Security News
MediaTek Security Update – Patch for Multiple Vulnerabilities Across Chipsets MediaTek Security Update – Patch for Multiple Vulnerabilities Across Chipsets Cyber Security News
CISA Highlights Notepad++ Vulnerability Amid Active Exploits CISA Highlights Notepad++ Vulnerability Amid Active Exploits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UK Hacker Admits to Crypto Theft in US Court
  • Android Malware Alert: MiningDropper’s Dangerous Impact
  • Cybercriminals Exploit QEMU for Stealthy Attacks
  • Why AI Projects Often Falter Post-Demo
  • NSA Utilizes Anthropic’s AI Amid Pentagon Ban

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UK Hacker Admits to Crypto Theft in US Court
  • Android Malware Alert: MiningDropper’s Dangerous Impact
  • Cybercriminals Exploit QEMU for Stealthy Attacks
  • Why AI Projects Often Falter Post-Demo
  • NSA Utilizes Anthropic’s AI Amid Pentagon Ban

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark