Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint

50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint

Posted on June 2, 2025June 2, 2025 By CWS

A crucial safety vulnerability affecting over 50,000 Azure Energetic Listing customers has been found, exposing delicate worker information by means of an unsecured API endpoint embedded inside a JavaScript file.

The incident, uncovered by cybersecurity agency CloudSEK, reveals how a single misconfiguration can grant unauthorized entry to Microsoft Graph information, together with executive-level data and organizational constructions.

The vulnerability originated from a hardcoded API endpoint discovered inside a JavaScript bundle on a publicly accessible subdomain of a significant aviation firm.

This endpoint, accessible with none authentication necessities, mechanically issued Microsoft Graph API tokens with extreme permissions, particularly Person.Learn.All and AccessReview.Learn.All capabilities.

Azure information (Supply – Cloudsek)

These elevated privileges sometimes require strict administrative oversight on account of their capacity to entry complete person profiles and demanding id governance configurations.

CloudSEK analysts famous that the uncovered endpoint continued to return information for newly added customers, indicating an ongoing safety danger that prolonged past the preliminary discovery.

The researchers recognized the vulnerability utilizing their BeVigil platform’s API Scanner, which detected the unsecured endpoint throughout routine assault floor monitoring of the group’s digital infrastructure.

The scope of uncovered data encompasses detailed worker data, together with names, job titles, contact particulars, reporting hierarchies, and entry overview configurations.

Assault circulation (Supply – Cloudsek)

Among the many compromised information have been data of senior executives, together with people with titles akin to “Chief Government Officer,” “Co-Founder & Director,” and “Principal Cyber Safety,” making them prime targets for stylish social engineering assaults and company espionage.

The incident highlights a basic safety oversight the place delicate backend providers have been instantly uncovered by means of client-side code, violating fundamental rules of safe software structure.

The misconfiguration demonstrates how trendy internet functions can inadvertently create vital assault vectors when correct safety controls usually are not applied.

Vulnerability Evaluation

The core vulnerability stemmed from improper token administration throughout the software’s front-end structure.

The JavaScript file contained embedded logic that mechanically generated Microsoft Graph entry tokens with broad permissions, successfully bypassing Azure AD’s built-in safety controls. The uncovered endpoint utilized the next permission scopes:-

{
“scope”: “Person.Learn.All AccessReview.Learn.All”,
“grant_type”: “client_credentials”
}

This configuration allowed any particular person with entry to the endpoint to question Microsoft Graph APIs and retrieve complete organizational information.

The vulnerability exemplifies how client-side publicity of authentication mechanisms can circumvent enterprise safety insurance policies, creating unauthorized pathways into protected cloud providers.

CloudSEK’s evaluation revealed that the token technology occurred with out correct validation or fee limiting, enabling potential attackers to extract giant volumes of delicate company information systematically.

Have fun 9 years of ANY.RUN! Unlock the total energy of TI Lookup plan (100/300/600/1,000+ search requests), and your request quota will double.

Cyber Security News Tags:Access, API, Azure, Endpoint, Exposed, Token, Unauthenticated, Users

Post navigation

Previous Post: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More
Next Post: vBulletin Vulnerability Exploited in the Wild

Related Posts

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems Cyber Security News
ValleyRAT Malware Uses Stealthy Driver Install to Bypass Windows 11 Protections ValleyRAT Malware Uses Stealthy Driver Install to Bypass Windows 11 Protections Cyber Security News
Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Cyber Security News
ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration Cyber Security News
Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Cyber Security News
SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News