Security Experts:

Connect with us

Hi, what are you looking for?



Facebook Rushes to Patch Bug Exposing Page Admins

Facebook last week rushed to patch a bug that exposed the accounts of individuals who manage pages, after the weakness was exploited against several high-profile pages.

Facebook last week rushed to patch a bug that exposed the accounts of individuals who manage pages, after the weakness was exploited against several high-profile pages.

If a Facebook page’s administrator edits a post, users can keep track of the modifications with the “View edit history” feature. This feature should show the user exactly when changes were made to a post, but the recent bug also revealed the account (i.e. profile) of the individual who made the modification.

The accounts that control Facebook pages are hidden by default and they should not be displayed in the Edit History window. The issue may have had serious implications, particularly for page administrators who are trying to keep their identity secret.

According to Wired, the vulnerability was introduced on Thursday evening and it was present only until Friday morning. Facebook told Wired that it learned of the issue from a security researcher, but it’s unclear who that researcher is.

Despite the fact that the bug existed for less than a day, it was disclosed on websites such as 4chan and people quickly began abusing it against high-profile pages. The targeted pages included the ones belonging to President Donald Trump, Canadian Prime Minister Justin Trudeau, activist Greta Thunberg, anonymous street artist Banksy, Anonymous hacktivists, and rapper Snoop Dogg.

This is not the first time a vulnerability has exposed the administrators of Facebook pages. Roughly two years ago, a researcher discovered that an email invitation to like a Facebook page contained — in the email source code —- the name of the page’s administrator.

Related: Facebook Expands, Enhances Bug Bounty Programs

Related: Instagram Account Takeover Vulnerability Earns Hacker $30,000

Related: CSRF Vulnerability in Facebook Earns Researcher $25,000

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet