Facebook revealed on Friday that a bug related to its Photo API could have allowed third-party apps to access users’ photos, even ones that were supposed to be private.
According to the social media giant, its internal team discovered a bug in the Photo API that impacted users who had utilized Facebook Login and allowed third-party apps to access their photos.
Applications that are granted access to photos are normally allowed to access only images shared on a user’s timeline. However, due to this flaw, developers could have accessed other photos as well, including ones shared on Facebook Marketplace or via Stories, or photos that were only uploaded to the social media service but not posted.
The vulnerability exposed photos for 12 days, between September 13 and September 25, 2018. Facebook believes the bug impacted up to 6.8 million users and 1,500 applications built by over 870 developers. The company pointed out that only apps granted access to photos by the user could have exploited the flaw.
Facebook says it’s notifying impacted people via an alert in their account and it also plans on releasing tools early next week that will allow developers to determine which of their users may have been affected by the issue. Developers will be instructed to delete photos obtained as a result of this bug.
Facebook announced this week that it has paid out more than $1.1 million through its bug bounty program in 2018, with roughly $7.5 million paid by the social media giant since the launch of its program in 2011.
The $1.1 million has been awarded to researchers from over 100 countries for more than 700 valid reports.
Facebook has been hit by several privacy and security incidents this year, which has resulted in the company expanding its bug bounty program and significantly increasing rewards for some types of vulnerabilities.
Related: The Scandals Bedevilling Facebook
Related: Industry Reactions to Facebook Hack

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
