959 email addresses exposed
A hardcoded API key on the public website of the project management platform ClickUp led to the prolonged exposure of nearly a thousand email addresses belonging to employees at Fortune 500 companies, cybersecurity firms, and government agencies. The vulnerability, which stemmed from an API key for the service Split.io being embedded in a public JavaScript file, remained unpatched for over 15 months despite being reported through a bug bounty program in January 2025. An unauthenticated attacker could use this key to download a 4.5MB file containing 959 email addresses and thousands of internal feature flags, creating a significant resource for targeted phishing campaigns.
The incident highlights the severe and persistent risk of hardcoded credentials in client-side applications. A researcher discovered that a JavaScript file hosted on ClickUp's homepage contained a static API key for Split.io, a feature management platform. This key was not intended for public exposure.
Because the key was in a client-side file, anyone could retrieve it by simply viewing the page's source code. A single, unauthenticated GET request using this key to the Split.io API was sufficient to download a large file of internal configuration data. This data included a list of 959 email addresses that ClickUp had apparently used for testing or segmenting features within Split.io. The exposed emails belonged to a wide range of high-profile organizations, making them valuable targets for threat actors.
This vulnerability is a classic example of T1552.006 - Credentials in Files, specifically within publicly accessible web assets.
This type of vulnerability is particularly dangerous because it requires no special tools to exploit and can be discovered through routine reconnaissance by attackers scanning public code repositories and websites.
The primary impact of this leak is the creation of a highly curated list of targets for sophisticated social engineering and phishing campaigns. The exposed email addresses belong to employees at major corporations like Home Depot, Autodesk, and Rakuten; cybersecurity firms Fortinet and Tenable; healthcare provider Mayo Clinic; and government workers in the U.S. and Australia. An attacker could use this list to craft targeted phishing emails that reference ClickUp, increasing their perceived legitimacy and the likelihood of success.
Furthermore, the exposure of 3,165 internal feature flags could provide attackers with insights into ClickUp's product roadmap, unreleased features, and internal architecture, which could be used to identify future attack vectors. The fact that the vulnerability remained unpatched for 15 months after being reported also raises concerns about the company's vulnerability management and bug bounty response processes.
No specific IOCs like file hashes or C2 IPs were provided. The core issue was a leaked API key.
This incident highlights a risk that organizations should hunt for within their own codebases.
Detection (for companies like ClickUp):
Response (from ClickUp):
Do not hardcode credentials in client-side code. Use secure backend methods to handle API keys and other secrets.
Implement secret scanning in CI/CD pipelines to detect and prevent credentials from being committed to code repositories.
The vulnerability was first reported to ClickUp via the HackerOne bug bounty platform.
The vulnerability and data leak were publicly disclosed after remaining unpatched for over 15 months.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.