Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fiverr Faces Data Breach Due to Cloudinary Misconfiguration

Fiverr Faces Data Breach Due to Cloudinary Misconfiguration

Posted on April 18, 2026 By CWS

Fiverr, a prominent freelance marketplace, is embroiled in a privacy controversy following revelations by researchers that personal customer files have been made publicly accessible through Google. The breach, highlighted on Hacker News, stems from a misconfigured file-hosting setup that exposed sensitive data, including tax forms, exchanged between freelancers and clients.

The Cloudinary Configuration Issue

The problem originated from Fiverr’s method of handling file exchanges within its messaging system. Fiverr utilizes Cloudinary, a third-party service, to manage and host images and documents, including completed work submitted to clients. Despite Cloudinary’s capability to create secure, time-limited links, Fiverr reportedly set up the service to generate publicly accessible URLs for sensitive files. This lack of protection allowed search engines like Google to index these files.

It appears that these public links were inadvertently exposed through unsecured HTML pages within Fiverr’s network. This oversight has severe implications, as specific searches on Google can reportedly reveal private documents, such as tax forms, containing essential financial data.

Regulatory and Security Concerns

The situation presents a stark contradiction, as Fiverr invests in Google Ads for tax-related services while failing to secure the sensitive outputs of such services. This lapse raises significant regulatory alarms, potentially breaching the Federal Trade Commission’s Safeguards Rule and the Gramm-Leach-Bliley Act, both of which demand rigorous protection of consumer financial information.

The researcher who uncovered the issue adhered to responsible disclosure practices, notifying Fiverr’s security team 40 days before making the findings public. However, due to the absence of a response or corrective measures from Fiverr, the researcher opted to release the information publicly to alert potentially affected users.

Recommendations and User Precautions

Until Fiverr addresses this security flaw, users remain vulnerable to identity theft and financial fraud. It is recommended that freelancers and clients cease the transmission of sensitive documents via Fiverr’s messaging platform. Additionally, Fiverr should promptly update its Cloudinary integration to use signed URLs that expire after download to safeguard transferred files.

The company must also act swiftly to request the removal of exposed directories from Google’s search index. Clients who have engaged in financial services on Fiverr should vigilantly monitor their credit reports for any unauthorized activity.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Reach out to us to feature your stories.

Cyber Security News Tags:Cloudinary, Cybersecurity, data breach, Fiverr, FTC, GLBA, Google indexing, PII, Privacy, Security

Post navigation

Previous Post: Grinex Exchange Halts After $13.74M Cyber Heist Linked to Intelligence
Next Post: Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Related Posts

Interlock Ransomware Utilizes Zero-Day to Evade Security Interlock Ransomware Utilizes Zero-Day to Evade Security Cyber Security News
New Research Details on What Happens to Data Stolen in a Phishing Attack New Research Details on What Happens to Data Stolen in a Phishing Attack Cyber Security News
Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Cyber Security News
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Google Confirms That Claims of Major Gmail Security Warning are False Google Confirms That Claims of Major Gmail Security Warning are False Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats
  • Fiverr Faces Data Breach Due to Cloudinary Misconfiguration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats
  • Fiverr Faces Data Breach Due to Cloudinary Misconfiguration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark