Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/New Instagram Flaw Exposes Private User Posts Vulnerability Anyone
CyberSecurity News

New Instagram Flaw Exposes Private User Posts Vulnerability Anyone

A critical server-side vulnerability within Instagram’s infrastructure allowed unauthenticated attackers to access private user photos and their accompanying captions. This exploit required no login...

Sarah simpson
Sarah simpson
January 26, 2026 3 Min Read
0 0

A critical server-side vulnerability within Instagram’s infrastructure allowed unauthenticated attackers to access private user photos and their accompanying captions. This exploit required no login credentials or follower relationship, as detailed in a disclosure released this week by security researcher Jatin Banga.

The vulnerability, which was reportedly patched silently by Meta in October 2025, relied on a specific configuration of HTTP headers to bypass privacy controls on the mobile web interface.

The “Polaris” Exploit Mechanism

The vulnerability stemmed from a failure in Instagram’s server-side authorization logic rather than a simple caching error. Banga discovered that sending an unauthenticated GET request to instagram.com/<private_username> with specific mobile user-agent headers triggered a response containing the polaris_timeline_connection JSON object.

Private post expose claim
Private post expose claim

Under normal circumstances, this object should be empty or restricted for private accounts viewed by non-followers. However, for affected accounts, the server returned a full edges array containing direct Content Delivery Network (CDN) links to private media and their associated captions.

Exploit Workflow:

  1. Request: Attacker sends a header-manipulated GET request to a private profile.
  2. Response: Server returns HTML with embedded JSON data.
  3. Extraction: The polaris_timeline_connection object is parsed to locate the edges array.
  4. Access: High-resolution images and post details are accessed via the exposed CDN URLs.

This “conditional” bug did not affect every account. In testing, approximately 28% of authorized test accounts were vulnerable, while others returned secure responses, suggesting a specific backend state or “corrupted” session handling was required to trigger the leak.

Timeline of a Silent Patch

The disclosure outlines a contentious 102-day interaction with Meta’s bug bounty program. Banga submitted the initial report on October 12, 2025, including a Proof-of-Concept (PoC) script and video evidence.

After an initial rejection claiming the issue was CDN caching, Meta requested specific vulnerable accounts for verification. On October 14, Banga provided a consenting third-party account (its_prathambanga) where the exploit was successfully reproduced.

Two days later, on October 16, the exploit ceased to function across all previously vulnerable accounts, indicating a server-side patch had been deployed. However, Meta provided no notification of the fix.

Despite the silent patch, Meta officially closed the report on October 27 as “Not Applicable,” stating they were “unable to reproduce” the issue.

When challenged about the contradiction, asking for vulnerable accounts and then fixing them, Meta’s security team responded that the fix may have been an “unintended side effect” of other infrastructure changes.

The closure has drawn criticism for its lack of root cause analysis. Without acknowledging the specific flaw, it remains unclear whether the underlying authorization failure was permanently resolved or merely obscured by a configuration shift.

Banga has released the full technical analysis, network logs, and a Python PoC script on GitHub to facilitate peer review. The release invites independent security researchers to examine the artifacts and validate the findings.

“A conditional bug that exposes some accounts but not others is arguably more dangerous than one that affects everyone,” Banga noted in his report. “Dismissing it with ‘infrastructure changes’ doesn’t inspire confidence”.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Sandworm APT Targets Poland Power Grid with Dyn Group Targeting

Next Post

SyncFuture Campaign: Legitimate Software Deploying Malware

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us