Last month, I found an IDOR (Insecure Direct Object Reference) vulnerability in a popular dating app that allowed me to view every user’s private messages, photos, and location data — just by changing a number in the URL. The company paid me $8,000 for this critical find. Today, I’ll show you exactly how I did it, step-by-step, with real examples you can test yourself.
Zoom image will be displayed
IDOR happens when an app lets you access data you shouldn’t by modifying a parameter (like a user ID, invoice number, or document ID).
Imagine a hotel where your room key (e.g., Room 305) also works for Room 306, 307, 308… if you just try different numbers. That’s IDOR.
GET /api/user/profile?id=12345
12345
, but what if I changed it?