FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Photo Booth Website Bug Exposed Thousands of Users’ Photos

Gregory Zuckerman
Last updated: December 12, 2025 4:14 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

A photo booth maker’s website with just a handful of lines of code left thousands of images and videos accessible to the internet, including snaps of drunken revellers on nights out and intimate moments. And the security lapse, which was related to the way in which the site stored and served media, enabled anyone who knew where to look to download entire galleries without even having to log in.

The researcher, who goes by Zeacer, said the company had recently reduced the retention of files online from an average of two to three weeks to around 24 hours. That cut decreases the overall amount of content visible at any given time but does nothing to stop a malefactor from scraping all uploads for the day and then repeating that task every day. At one stage, prior to the retention change, over 1,000 images were viewable from a photo booth service operating in Melbourne, he said.

Table of Contents
  • What the researcher found about the insecure media URLs
  • Why the website bug matters for user privacy and safety
  • How these access control bugs happen in photo booth apps
  • Regulatory and legal stakes for data exposure incidents
  • What customers and event hosts can do to reduce the risk now
  • A familiar pattern in event tech security and web app design
Photo booth website bug exposes thousands of user photos in data breach

What the researcher found about the insecure media URLs

According to a review shared with this publication, the site’s media endpoint served files over predictable URLs and failed to adequately password-protect them at all times. That resulted in a good, old-fashioned enumeration problem: by incrementing or using simple pattern logic, a script could pull every photo and video ever uploaded to the server.

This is the sort of thing that security pros refer to as broken access control or insecure direct object reference. OWASP rates broken access control as the number one risk of web applications, and for good reason: it’s easy to overlook when developing a product, but incredibly powerful if abused.

Why the website bug matters for user privacy and safety

Event photo booths record extremely personal moments — weddings, office parties and product launches. These pictures can expose children, home addresses on badges or sensitive affiliations that are visible on lanyards and backdrops. And even if galleries are cycled off the server within a day, scraped copies remain on an attacker’s machine forever.

The losses to investments from this exposure can be significant. The new IBM Cost of a Data Breach Report puts the global average costs of breaches in the multi-millions — including related response, customer notification and legal exposure. The reputational damage for a consumer-facing brand — especially one predicated on “shareable moments” — may be even more difficult to calculate.

How these access control bugs happen in photo booth apps

Many event-tech vendors depend on swift, cloud-based galleries to send files to clients’ phones within seconds. The siren song of public object storage, small URL path patterns, or client-side-only checks may lure teams to cut corners. And without server-side permission gates (signed URLs, rotating tokens or unguessable IDs) these galleries can be enumerated at scale.

Defenses are well known:

  • Private-by-default storage
  • Time-limited and audience-restricted links
  • Randomized IDs
  • Rate limiting
  • Continuous logging to prevent unusual download bursts

A thorough security pre-production review and regular penetration testing often catch these before they make it into production.

A 16:9 aspect ratio image of the Facebook Like sign at 1 Hacker Way, with trees and a blue sky in the background.

Regulatory and legal stakes for data exposure incidents

There may be multiple privacy regimes that could apply, depending on where the booth is placed and who is pictured. In Australia, the Office of the Australian Information Commissioner requires businesses to be proactive in securing data and disclosing eligible data leaks. In the EU and UK, GDPR mandates data protection by design, and fines of up to 4% of global annual turnover for serious breaches.

One question is whether the vendor is a service provider to event hosts (a processor) or it serves consumers itself (as a controller). Either way, minimizing retention and locking down access are basic expectations — especially for media that depicts identifiable people.

What customers and event hosts can do to reduce the risk now

Those who made use of photo booths within the last month should work on the assumption that images potentially could have been accessed while they were in use, and should reach out to their vendor to tell them whether or not photos need to be deleted.

Practical steps for customers:

  • Set galleries to private, if possible.
  • Turn off public sharing options.
  • Request that vendors delete galleries permanently through support channels.
  • Don’t upload scans of IDs, addresses or other sensitive information to event galleries.

Event organizers should push suppliers for details:

  • How long are files kept?
  • Are links signed and time-limited?
  • Are IDs random and unguessable?
  • Is storage private by default?
  • What third-party audits back those claims (like SOC 2 or ISO 27001)?

Contracts must include specific data processing terms, breach notification responsibilities and a right to security review.

A familiar pattern in event tech security and web app design

The photo booth episode is representative of a trend in consumer media apps and event agencies, where breakneck growth outstrips security hardening. The newest Data Breach Investigations Report reinforces web app abuse and access control deficiencies as top reasons for data loss. These are problems that can easily be prevented — and they seldom demand exotic solutions.

For now, the vendor’s choice to shrink retention of such recordings limits how much is exposed at any one time, but it does not replace good authentication and authorization. And as long as galleries remain leaky sieves, there is a risk that an enterprising scraper can make moments meant for friends and family into a public archive.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Free Android App Brings Back Reading One Sentence at a Time
Apple AirTag Tracking Update Discovered in the iOS Code
Zevo to Roll Out Robotaxi Service With Tensor Vehicles
JBL Tune Flex earbuds hit their lowest price ever
Petco Breach, Temu Spyware Claims, as Ransomware Toll Hits $4.5B
FastestVPN lifetime VPN with ad blocker and privacy tools
Reddit Takes On Australia’s Social Media Ban in Court
AI Boom Blamed For Downgrades In 2026 Phone RAM
Wake Up Dead Man Reveals Church Book Club Reading List
Galaxy Z TriFold Will Have Identical Screen Repair Cost As S25 Ultra
AT&T Jumps Back Into Smart Home Security With Help From…Google
Fortnite Returns To Google Play As Apple Appeal Fails
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.