Article Details
Scrape Timestamp (UTC): 2026-01-31 14:38:10.022
Original Article Text
Click to Toggle View
Researcher reveals evidence of private Instagram profiles leaking photos. A security researcher has published detailed evidence showing that some Instagram private profiles returned links to user photos to unauthenticated visitors. Instagram's private account feature is designed to restrict photos, videos, stories, and reels to approved followers. However, the researcher's findings show that, in certain cases, private profile content was embedded in publicly accessible server responses. According to the researcher, Meta fixed the issue after his report was submitted but later closed it as "not applicable," stating the vulnerability could not be reproduced. Instagram private profiles leaking photos Security researcher Jatin Banga has recently demonstrated how certain Instagram private profiles were leaking links to private photos from these accounts—in the HTML response body itself. When accessed by an unauthenticated user from certain mobile devices, private Instagram profiles (such as the researcher-created https://instagram.com/jatin.py) display the standard message: "This account is private. Follow to see their photos and videos." However, in the HTML source code for affected profiles, links to some private photos were embedded in the page response. In Banga's example, the polaris_timeline_connection JSON object returned in the HTML contained encoded CDN links to photos that should not have been accessible. The video proof-of-concept (PoC) shared by Banga and embedded below demonstrates the data leak vulnerability in action. By limiting the formal testing to private test profiles Banga had created or had explicit permission to use, he found that at least 28% of the profiles were returning links to private photos: Meta quietly fixed the issue after report, researcher says The researcher states that he shared his findings with Instagram's parent company, Meta, as early as October 12, 2025. Meta initially classified the issue as a CDN caching problem, a characterization the researcher disputed. "This wasn't a CDN caching issue — Instagram's backend was failing to check authorization before populating the response," Banga wrote, describing it as a server-side authorization failure. Banga created a second bug report clarifying the issue, but did not reach a satisfactory resolution with Meta despite a lengthy discussion spanning days. According to the researcher, after repeated exchanges, the case was closed as "not applicable" but the exploit stopped working around October 16. "The standard coordinated disclosure window is 90 days. I gave Meta 102 days and multiple escalation attempts. The exploit stopped working on all accounts I tested — though without root cause analysis from Meta, there's no confirmation the underlying issue is truly resolved," he continues. In addition to his disclosure and the GitHub repository documenting extensive evidence of the flaw and communications with Meta, Banga shared additional materials with BleepingComputer to demonstrate the existence of the flaw. We asked Banga why he did not archive the test private profile using a public service like the Internet Archive's Wayback Machine, which could have preserved the HTML source code with the links to private photos present, thereby indisputably confirming the presence of a bug. "The Wayback Machine doesn't send the specific Mobile User-Agent and Headers required to trigger this server-side leak, so their crawlers couldn't capture it," the researcher clarified to BleepingComputer. In the published correspondence, a Meta vulnerability triage analyst wrote: Ultimately, during the course of the conversation, the analyst is seen stating: "The fact that an unreproducible issue was fixed doesn't change the fact that it was not reproducible at the time. Even if the issue were reproducible, it's possible that a change was made to fix a different issue and this issue was fixed as an unintended side effect." "I want to emphasize that I am not chasing a bounty here. By going public with this disclosure, I have forfeited any chance of a reward," Banga told BleepingComputer via email. "The goal is transparency. Meta patched a critical privacy leak 48-96 hours after my report but refused to acknowledge it, dismissing it as an 'unintended side effect.' Their negligence and reluctance to investigate the actual root cause—despite having the logs—is the real issue." "Nobody knows how long this has been actually exploited for, since it was not so hard to find." BleepingComputer contacted Meta for comment on three separate occasions well in advance of publication but did not receive a response. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.
Daily Brief Summary
Security researcher Jatin Banga discovered a flaw in Instagram's private profiles, allowing unauthorized access to private photos through embedded links in server responses.
The issue affected approximately 28% of tested private profiles, revealing a significant privacy concern for users who rely on Instagram's privacy settings.
The vulnerability was linked to Instagram's backend failing to check authorization before delivering responses, rather than a CDN caching issue as initially suggested by Meta.
Meta addressed the flaw shortly after Banga's report, yet classified it as "not applicable," arguing the issue was unreproducible, despite the exploit ceasing to function post-report.
Banga's disclosure process extended beyond the standard 90-day window, emphasizing transparency over reward, yet Meta's response lacked acknowledgment of the root cause.
The incident raises questions about Meta's vulnerability management and response practices, highlighting the importance of thorough root cause analysis in cybersecurity.
This case underscores the need for robust authorization checks and continuous monitoring to prevent similar data leaks in the future.