Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClickUp’s API Key Leak Exposes Fortune 500 Emails

ClickUp’s API Key Leak Exposes Fortune 500 Emails

Posted on April 27, 2026 By CWS

In a significant cybersecurity lapse, ClickUp has unintentionally exposed nearly a thousand corporate and government email addresses via a publicly accessible JavaScript file. This incident involves a hardcoded third-party API key that was identified in January 2025 and remains unaddressed as of April 2026.

Email Exposure and Its Discovery

The vulnerability was discovered by a security researcher who inspected ClickUp’s homepage. The researcher found the hardcoded API key embedded in a JavaScript file loaded before user authentication. Using an unauthenticated GET request, the researcher accessed 959 email addresses and 3,165 internal feature flags without needing credentials or advanced tools.

These exposed emails include employees from major companies such as Home Depot, Fortinet, Autodesk, Tenable, and Mayo Clinic, as well as government workers from several U.S. states and international locations like Queensland and New Zealand.

Implications of the Data Leak

The exposure is particularly concerning due to the nature of the affected organizations. Fortinet and Tenable are key players in the cybersecurity industry, providing critical infrastructure protection and vulnerability scanning tools. The leak of their employees’ email addresses could facilitate phishing attacks and other social engineering tactics.

Beyond email addresses, the internal feature flags revealed through this API key offer insight into product development processes, beta features, and testing configurations. This information could be exploited for competitive intelligence or to manipulate the platform.

Response and Consequences

Despite being reported to ClickUp via HackerOne in early 2025, the API key had not been rotated over 15 months later. The researcher confirmed that the data was still accessible just before making the disclosure public.

This situation highlights a severe oversight in ClickUp’s security practices, especially given the company’s prominence and the scale of its operations. ClickUp has raised substantial venture capital and claims extensive use among Fortune 500 companies. Yet, it has not publicly addressed this ongoing security issue.

Hardcoded secrets in client-side JavaScript are well-documented vulnerabilities, making this oversight particularly inexcusable. As of now, ClickUp has not made any public statements regarding the exposure.

Stay updated on this and other cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:API key, ClickUp, Cybersecurity, data breach, email exposure, Enterprise, Fortune 500, Government, HackerOne, internal feature flags, phishing risk, security vulnerability, unpatched vulnerability

Post navigation

Previous Post: New Fast16 Malware Uncovered: Cybersecurity Concerns Rise
Next Post: Google Patches Critical Gemini CLI Vulnerability

Related Posts

Why Cross-Training in Networking and Cybersecurity Matters Why Cross-Training in Networking and Cybersecurity Matters Cyber Security News
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Cyber Security News
NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks Cyber Security News
Urgent Patch for QNAP QVR Pro Security Flaw Released Urgent Patch for QNAP QVR Pro Security Flaw Released Cyber Security News
800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks 800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks Cyber Security News
Oblivion RAT: New Android Threat with Hidden Control Oblivion RAT: New Android Threat with Hidden Control Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise
  • Notepad++ Flaw Poses Security Risk for Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise
  • Notepad++ Flaw Poses Security Risk for Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark