Lovable calls data exposure intentional, shifts blame to HackerOne
Lovable’s free‑tier accounts allowed access to other users’ source code, database credentials and chat histories via a BOLA vulnerability; the firm labeled the exposure intentional and faulted HackerOne for missing the bug.

TL;DR
A free Lovable account let anyone view other users’ source code, database credentials and chat histories due to a broken object level authorization flaw. The company called the exposure intentional, then blamed its bug‑bounty partner HackerOne for missing the issue.
Context
Lovable, a vibe‑coding AI platform valued at $6.6 billion, lets users mark projects as public or private. Researchers reported that selecting “public” also exposed the underlying code and secrets of any project, a problem traced to a missing ownership check in the API.
Key Facts
The researcher created a free account and, with five API calls, accessed another user’s profile, public projects and source code, then extracted database credentials. This matches a Broken Object Level Authorization (BOLA) vulnerability, where the API fails to validate that a user owns the object they request. The flaw was reported 48 days earlier through HackerOne, which labeled the submission a duplicate and left it open. Lovable first said the visibility was unclear documentation, then stated that showing code for public projects was intentional behavior by design, and later blamed HackerOne for not escalating the report. The company said it had retroactively patched the API in December 2025 to block chat access on public projects, but a February 2025 permission‑unification effort accidentally re‑enabled the access.
What It Means
The incident shows how ambiguous API authorization can leak sensitive data even without sophisticated hacking. It also highlights the risk when companies deflect responsibility onto bug‑bounty platforms instead of fixing the underlying flaw. Users of Lovable should assume any project marked public before the February 2025 re‑exposure may have been accessible to anyone with a free account.
What Defenders Should Do
- Review API endpoints for object‑level authorization and enforce ownership checks (MITRE ATT&CK T1190). - Apply the principle of least privilege: ensure public flags only expose intended assets. - Monitor for anomalous API calls that read multiple users’ objects; a detection signature could flag >3 distinct object IDs accessed from the same token within a minute. - If using Lovable, audit project visibility settings and rotate any database credentials or API keys stored in source code. - Encourage vendors to publish a CVE for the BOLA flaw and subscribe to their security advisories for patches.
Watch for Lovable’s next update on API authorization controls and whether it adopts private‑by‑default for all new projects.
Continue reading
More in this thread
Vercel Database Leak Sold for $2 Million After Context AI Supply‑Chain Breach
Peter Olaleru
Elmwood Healthcare Breach Exposes SSNs and Medical Data, Triggering Class Action Investigation
Peter Olaleru
Elmwood Healthcare Breach Exposes SSNs and Medical Data, Prompting Class‑Action Inquiry
Peter Olaleru
Conversation
Reader notes
Loading comments...