Key Takeaways
- A server-side authorization failure in Instagram’s mobile web interface allowed unauthenticated users to access private account posts without authentication, follower relationships, or user consent.
- The vulnerability, disclosed by security researcher Jatin Banga, highlights significant gaps in Meta’s vulnerability handling practices and compensatory security controls.
- The attack required no authentication credentials, follower relationships, or special privileges, only knowledge of a target’s username and a basic HTTP client.
- Meta’s response to the vulnerability was criticized for being dismissive, lacking transparency, and failing to provide sufficient information to verify that the issue was comprehensively addressed.
Introduction to the Vulnerability
A server-side authorization failure in Instagram’s mobile web interface allowed completely unauthenticated users to access private account posts without authentication, follower relationships, or user consent. This vulnerability, disclosed by security researcher Jatin Banga after 102 days of coordinated disclosure efforts, highlights significant gaps in Meta’s vulnerability handling practices and compensatory security controls protecting over one billion Instagram users. The vulnerability was exploited by sending unauthenticated GET requests to instagram.com using specific mobile headers, and the server responded with HTML containing embedded JSON data structures.
Technical Overview of the Vulnerability
The vulnerability exploited a server-side authorization failure rather than a content delivery network (CDN) caching issue. Attackers sent unauthenticated GET requests to instagram.com using specific mobile headers, and the server responded with HTML containing embedded JSON data structures. Specifically, the polaris_timeline_connection object included CDN links to full-resolution private photos, captions, and restricted metadata without proper authorization checks. The attack required no authentication credentials, follower relationships, or special privileges, only knowledge of a target’s username and a basic HTTP client. This made it relatively easy for attackers to exploit the vulnerability and access private account posts without being detected.
Impact of the Vulnerability
Testing across seven authorized accounts revealed that the vulnerability affected approximately 28% of the tested accounts. However, Banga suggests the actual exploitation rate may be higher based on accidental discovery patterns observed during testing. The conditional nature of the vulnerability affecting unpredictable account subsets made it particularly dangerous compared to universal exploits affecting all users uniformly. This is because conditional vulnerabilities can be used to target specific users or groups, making them more difficult to detect and mitigate. The fact that the vulnerability was not universal, but rather affected a subset of accounts, made it more challenging to identify and fix.
Meta’s Response to the Vulnerability
Banga submitted the initial report to Meta’s bug bounty program on October 12, 2025. Meta’s first response misclassified the issue as a CDN caching artifact and closed the case without investigation. A second clarifying report the same day corrected Meta’s understanding, distinguishing the authorization failure from network-layer issues. By October 16, just four days after detailed technical evidence was provided, the vulnerability no longer functioned across all previously vulnerable accounts, indicating Meta had patched the issue. However, Meta never explicitly confirmed the fix or acknowledged the vulnerability’s existence. On October 27, Meta officially responded: "We are unable to reproduce this issue," despite requesting vulnerable test accounts from Banga and subsequently patching those exact accounts.
Concerns with Meta’s Response
Meta characterized the remediation as an unintended consequence of unrelated infrastructure changes rather than targeted bug fixes, raising questions about whether permanent security measures were implemented. Banga documented the vulnerability with comprehensive evidence: timestamped video proof-of-concept, complete HTTP network logs with headers, before-and-after screenshots, and full Meta correspondence. All materials were committed to GitHub with cryptographic integrity verification, preventing retroactive modification or claims of mischaracterization. Three critical concerns emerged from Meta’s response: the company declined to offer debug data and X-FB-Debug headers for internal tracing, rejected a comparative account analysis dataset for understanding vulnerability conditions, and did not conduct visible root cause analysis to confirm permanent remediation. These refusals prevented independent verification that the issue was comprehensively addressed.
Conclusion and Implications
Instagram serves over one billion users whose account privacy settings depend entirely on backend authorization enforcement. Conditional vulnerabilities affecting unpredictable account subsets pose particular risks because they enable targeted attacks against specific users while remaining difficult to detect at scale. Banga’s public disclosure after exceeding the standard 90-day coordinated disclosure window underscores frustration with Meta’s dismissive handling of a critical privacy breach, absent acknowledgment of vulnerability existence, and insufficient transparency regarding remediation efforts. The incident demonstrates why security researchers should document vulnerabilities exhaustively and maintain the cryptographic integrity of evidence when organizational responses lack transparency or accountability. Ultimately, the vulnerability and Meta’s response to it highlight the need for improved security practices and transparency in the tech industry.


