{"id":33714,"date":"2020-03-06T13:21:07","date_gmt":"2020-03-06T13:21:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/"},"modified":"2020-03-06T13:21:07","modified_gmt":"2020-03-06T13:21:07","slug":"nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/","title":{"rendered":"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/02\/21\/hatton-garden-heist.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A vulnerability in NordVPN&#8217;s payments platform allowed anyone to view users&#8217; payment information and email addresses, a startling HackerOne entry has revealed.<\/p>\n<p>By simply sending an HTTP POST request without any authentication at all to <em>join.nordvpn.com<\/em> one could read off users&#8217; email addresses, payment method and URL, currency, amount paid and even which product they bought.<\/p>\n<p>The patched flaw was made public in early February on the HackerOne bug bounty platform and was forwarded to <em>The Register<\/em> by concerned reader Matt, who told us: &#8220;Note that this is regardless of whether the users had set strong passwords and otherwise wouldn&#8217;t be vulnerable to credential-stuffing attacks.&#8221;<\/p>\n<p>When sending a straightforward HTTP POST request to the insecure API, the researcher who found the vuln received this string back:<\/p>\n<pre>\n&lt;{\"id\":42615458,\"user_id\":20027039,\"confirmation\":{\"id\":23093398,\"created_at\":\"2019-12-04 17:01:35\",\"updated_at\":\"2019-12-04 17:01:35\",\"type\":\"redirect_post\",\"value\":\"{\\\"url\\\":\\\"https:\\\\\\\/\\\\\\\/www.coinpayments.net\\\\\\\/index.php\\\",\\\"parameters\\\":{\\\"cmd\\\":\\\"_pay\\\",\\\"reset\\\":1,\\\"email\\\":\\\"\u2588\u2588\u2588\u2588\u2588\\\",\\\"merchant\\\":\\\"e64a9629f9a68cdeab5d0edd21b068d3\\\",\\\"currency\\\":\\\"USD\\\",\\\"amountf\\\":125.64,\\\"item_name\\\":\\\"VPN order\\\",\\\"invoice\\\":\\\"49476958\\\",\\\"success_url\\\":\\\"https:\\\\\\\/\\\\\\\/join.nordvpn.com\\\\\\\/payments\\\\\\\/callback\\\\\\\/264cae0b89e44a7bd263431b68d1122d\\\",\\\"cancel_url\\\":\\\"https:\\\\\\\/\\\\\\\/join.nordvpn.com\\\\\\\/order\\\\\\\/error\\\\\\\/?error_alert=payment&amp;eu=1\\\",\\\"want_shipping\\\":0}}\"}}\n<\/pre>\n<p>By changing the &#8220;id&#8221; and &#8220;user_id&#8221; numbers, he was able to view random folks&#8217; data, as detailed on <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/hackerone.com\/reports\/751577\">the full HackerOne entry<\/a>.<\/p>\n<p>Professor Alan Woodward of the University of Surrey told <em>The Register<\/em> that while the vuln was bad, it would require an extra step to enumerate user IDs before the attack would work at scale.<\/p>\n<p>He said: &#8220;I assume the structure can be determined and so enumeration wouldn&#8217;t be impossible, i.e. having to know the ID isn&#8217;t really much protection in itself\u2026 It&#8217;s the sort of bug that can erode trust, which is vital to VPN providers.&#8221;<\/p>\n<p>Prof Woodward added: &#8220;It was a simple POST to retrieve data that should not have been openly returned. Writing a script to enumerate the IDs and repeatedly send the POST would presumably have returned data on any of those IDs that were valid.&#8221;<\/p>\n<p>NordVPN told <em>The Register<\/em> it was very happy with its HackerOne membership and bug bounty scheme, while declining to say whether it had informed its customers about the vuln.<\/p>\n<p>Instead, company spokeswoman Jody Myers said: &#8220;Such reports are one of the reasons why we have launched the bug bounty program. We are extremely happy with its results and encourage even more researchers to analyze our product. This is an isolated case that potentially affected only a handful of users, due to the implemented rate-limiting. Theoretically, only email addresses could have been seen by a third party.&#8221;<\/p>\n<p>Our reader, Matt, spotted another NordVPN <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/hackerone.com\/reports\/751604\">disclosure<\/a> from around the same time which appeared to show rate-limiting had not been implemented on its password reset page. Nonetheless, both bugs have now been patched and bounty&#8217;d.<\/p>\n<p>The payment data vuln is of a class called insecure direct object reference, or IDOR. IDOR vulns are, as we <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/07\/10\/thomas_cook_privacy_flap\/\" rel=\"noopener noreferrer\">reported when defunct travel agency Thomas Cook suffered one<\/a> in 2018, &#8220;a common enough and basic problem on poorly-designed web applications&#8221;.<\/p>\n<p>Last year NordVPN came under criticism after an unknown miscreant managed to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/10\/21\/nordvpn_security_issue\/\" rel=\"noopener noreferrer\">gain access to one of its servers through a remote management system<\/a>. Before that, <em>Reg<\/em> readers and others observed some very strange NordVPN-connected traffic which <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/26\/nordvpn_strange_traffic_domains\/\" rel=\"noopener noreferrer\">bore some similarities to botnet command-and-control signalling<\/a>. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1901\/-8266\/quit-your-addiction-to-storage?td=wptl1901\">Quit your addiction to storage<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/03\/06\/nordvpn_no_auth_needed_view_user_payments\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fiddle with some numbers and voila A vulnerability in NordVPN&#8217;s payments platform allowed anyone to view users&#8217; payment information and email addresses, a startling HackerOne entry has revealed.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33715,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-33714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-06T13:21:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data\",\"datePublished\":\"2020-03-06T13:21:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/\",\"name\":\"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg\",\"datePublished\":\"2020-03-06T13:21:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg\",\"width\":648,\"height\":348},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/","og_locale":"en_US","og_type":"article","og_title":"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-06T13:21:07+00:00","og_image":[{"width":648,"height":348,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data","datePublished":"2020-03-06T13:21:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/"},"wordCount":517,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/","url":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/","name":"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg","datePublished":"2020-03-06T13:21:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data.jpg","width":648,"height":348},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nordvpn-quietly-plugged-vuln-where-an-http-post-request-without-authentication-would-return-detailed-customer-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"NordVPN quietly plugged vuln where an HTTP POST request without authentication would return detailed customer data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33714"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33714\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33715"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}