Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/Lovable AI App Builder API Flaw Exposes Thousands of
CyberSecurity News

Lovable AI App Builder API Flaw Exposes Thousands of

A critical Broken Object Level Authorization (BOLA) vulnerability within Lovable, a popular AI-powered app builder platform, reportedly allows unauthorized users access to sensitive project data....

Sarah simpson
Sarah simpson
April 20, 2026 3 Min Read
13 0

A critical Broken Object Level Authorization (BOLA) vulnerability within Lovable, a popular AI-powered app builder platform, reportedly allows unauthorized users access to sensitive project data. This includes source code, database credentials, AI chat histories, and real customer information from thousands of projects created before November 2025.

The flaw, classified as a Broken Object Level Authorization issue, allows any free-tier Lovable account holder to make unauthenticated API calls to the platform’s backend and retrieve project data belonging to other users.

BOLA vulnerabilities occur when an API grants access to objects without verifying whether the requesting user actually owns or has permission to view them. This class of flaw is ranked #1 in the OWASP API Security Top 10 for its prevalence and ease of exploitation.

According to a researcher with the handle @weezerOSINT, the API endpoint https://api.lovable.dev/GetProjectMessagesOutputBody appears to return full project message histories, AI thinking logs, and tool-use records without enforcing proper object-level access controls.

The exposed JSON responses contain user IDs, session content, and internal AI reasoning chains that were never intended to be publicly accessible.

The vulnerability was reported to Lovable via HackerOne approximately 48 days before public disclosure, yet the flaw reportedly remains unpatched for projects created prior to November 2025.

Lovable has a mass data breach affecting every project created before november 2025.

I made a lovable account today and was able to access another users source code, database credentials, AI chat histories, and customer data are all readable by any free account.

nvidia,… pic.twitter.com/QcVvz9cNZl

— impulsive (@weezerOSINT) April 20, 2026

While Lovable appears to have applied a fix for newly created projects, the legacy project base remains exposed, leaving a significant risk window for users who built applications on the platform before the cutoff date.

Researchers examining the vulnerability uncovered particularly alarming examples. One affected project belonged to Connected Women in AI, a nonprofit organization, and reportedly contained exposed Supabase database credentials alongside real user data.

Among the data found were records linked to individuals from Accenture Denmark and Copenhagen Business School. Beyond nonprofit exposure, employees at major technology firms, including Nvidia, Microsoft, Uber, and Spotify, reportedly have Lovable accounts tied to affected projects, raising the potential that sensitive corporate development data could be at risk.

The vulnerability was submitted on the HackerOne bug bounty platform and was marked as a duplicate of report #3583821, labeled “Broken Object Level Authorization on Lovable API leads to unauthorized access to user data and project source code”.

The duplicate submission was flagged as Informative, suggesting the issue was already known to the platform prior to the latest disclosure on March 3, 2026, yet public evidence continues to show the flaw remains exploitable on legacy accounts.

Security researchers recommend that Lovable users who created projects before November 2025 should immediately rotate any API keys, database credentials, or secrets stored within those projects. Users should assume that chat histories and source code associated with older projects may have already been accessed.

The incident underscores a recurring challenge in AI-native development platforms: security controls often lag behind rapid feature deployment, leaving early adopters most exposed.

Organizations building production applications on low-code AI builders should enforce secrets management practices independent of the platform, and regularly audit API exposure for any sensitive credentials embedded in project repositories or chat contexts.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

BreachExploitHackerPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

New Helpdesk Impersonation Abuses Microsoft Attackers Teams

Next Post

Iranian MOIS Uses Multiple Hacker Personas for Cyber Campaign

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us