RCI Hospitality Holdings, Inc., a leading operator in the adult nightclub and sports bar industry, has disclosed a data breach that exposed the sensitive personal data of its independent contractors. According to a filing with the U.S. Securities and Exchange Commission (SEC), the incident was caused by an Insecure Direct Object Reference (IDOR) vulnerability on a Microsoft Internet Information Services (IIS) web server. An unauthorized actor exploited this common web application flaw in March 2026 to access data including Social Security numbers. The company asserts that customer data and business operations were not affected.
The root cause of the breach was an Insecure Direct Object Reference (IDOR) vulnerability. IDOR is a type of access control flaw where an application uses user-supplied input to access objects directly. In this case, an attacker was likely able to manipulate a parameter in a URL or API request (e.g., changing ?contractor_id=123 to ?contractor_id=124) to cycle through and access the records of other contractors without proper authorization checks.
The breach resulted in the unauthorized access to a range of sensitive Personally Identifiable Information (PII) belonging to independent contractors. The exposed data includes:
This places the affected individuals at a high risk of identity theft, financial fraud, and other malicious activities. While RCI Hospitality stated that customer data was not impacted and that the data has not been publicly disseminated, the potential for misuse of the stolen contractor data remains significant.
Detecting IDOR exploitation requires careful monitoring of application behavior:
id=123, use indirect reference maps or verify on the server-side that the logged-in user (session.user_id) is authorized to access the requested object (requested_object.owner_id).Implementing proper access control checks within the application logic is the primary defense against IDOR vulnerabilities.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats