Friday, May 23, 2025
HomeCyber Security NewsIndian Post Office Portal Leak Exposes Thousands of KYC Records

Indian Post Office Portal Leak Exposes Thousands of KYC Records

Published on

SIEM as a Service

Follow Us on Google News

The Indian Post Office portal recently exposed the sensitive Know Your Customer (KYC) data of thousands of users due to a critical vulnerability known as Insecure Direct Object References (IDOR).

This alarming flaw allowed unauthorized individuals to access private user information, including Aadhaar numbers, PAN details, addresses, and other personal records, merely by manipulating numbers in the URL.

The Vulnerability Unveiled

A Security Researcher unveiled in Medium that an IDOR vulnerability occurs when a web application inadvertently allows users to access restricted information by altering parameters in the URL without proper authentication checks.

- Advertisement - Google News
IDOR working
IDOR working

In this case, anyone with basic technical knowledge could retrieve sensitive KYC documents by incrementing or modifying document IDs in the URL, leaving confidential information unprotected.

For example, a sample request made to the Indian Post Office portal demonstrated how easily this data could be accessed.

POC Image
POC Image

By sending a simple GET request without an authorization token, users were able to view sensitive information including user IDs, Aadhaar and PAN numbers, and links to downloadable KYC documents.

This lack of proper validation and authorization created a massive loophole for exploitation.

Sample Request and Response:

Request
text
GET /api/kyc/document?document_id=125678 HTTP/1.1 
Host: govportal.in
Response
json
{
  "status": "success",
  "document_id": "125678",
  "user_id": "345678",
  "name": "Rahul Sharma",
  "aadhaar_number": "XXXX-XXXX-1234",
  "pan_number": "ABCDE1234F",
  "kyc_document": "https://govportal.in/kyc_docs/125678.pdf"
}

The absence of authentication tokens made it possible to brute-force document IDs and retrieve the KYC records of other users, leaving critical personal data exposed.

Brute Forcing with ID
Brute Forcing with ID

Ethical Disclosure and Swift Action

Upon identifying the vulnerability, the researcher followed ethical protocols:

  1. The issue was immediately reported to the Indian Post Office and relevant cybersecurity authorities.
  2. The researcher highlighted the potential risks stemming from this flaw, including identity theft, phishing scams, and misuse of government data.
  3. The vulnerability was also shared with the Computer Emergency Response Team (CERT-In), India’s leading cybersecurity incident response team.

CERT-In responded promptly, acknowledging the report and coordinating efforts to secure the affected systems.

Response from Cert-In
Response from Cert-In

The Indian Post Office took swift action to address the issue, patching the vulnerability and securing its API endpoints.

Government platforms hold vast amounts of personal and financial data, making them prime targets for cyberattacks. A breach of this magnitude could lead to:

  1. Identity theft: Bad actors could misuse Aadhaar and PAN details for fraud.
  2. Phishing attacks: Access to personal data can enhance the effectiveness of scams.
  3. Legal repercussions: Mishandling KYC data risks violating privacy regulations under India’s impending Data Protection Act.

This incident highlights the urgent need for improved security measures in public sector platforms. Regular penetration testing, robust authentication protocols, and stronger API validations must be prioritized to prevent such breaches in the future.

The Indian Post Office’s proactive response and collaboration with CERT-In set an example of how organizations should handle disclosures responsibly.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats,...

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself...

GenAI Assistant DIANNA Uncovers New Obfuscated Malware

Deep Instinct’s GenAI-powered assistant, DIANNA, has identified a sophisticated new malware strain dubbed BypassERWDirectSyscallShellcodeLoader. This...

Hackers Expose 184 Million User Passwords via Open Directory

A major cybersecurity incident has come to light after researcher Jeremiah Fowler discovered a...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats,...

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself...

GenAI Assistant DIANNA Uncovers New Obfuscated Malware

Deep Instinct’s GenAI-powered assistant, DIANNA, has identified a sophisticated new malware strain dubbed BypassERWDirectSyscallShellcodeLoader. This...