> series: anatomy_of_a_breach —— part: 073 —— target: moonpig —— vulnerability: zero_api_authentication —— disclosure_ignored: 17_months<span class="cursor-blink">_</span>_
In January 2015, security researcher Paul Price publicly disclosed a vulnerability in Moonpig's mobile application API that was staggering in its simplicity: the API required no authentication. When the Moonpig app communicated with the company's servers to retrieve customer data, the API calls included a customer ID number but no authentication token, session cookie, or credentials. By changing the customer ID to any other number, anyone could retrieve the account details — name, address, date of birth, phone number, email, and the last four digits of payment cards — of any Moonpig customer.
Price had responsibly disclosed the vulnerability to Moonpig in August 2013 — 17 months before going public. Moonpig acknowledged the report but took no action to fix the vulnerability. After 17 months of waiting, Price published his findings. The disclosure generated intense media coverage, Moonpig's mobile API was taken offline within hours, and the ICO launched an investigation. The case was a textbook example of both the dangers of unauthenticated APIs and the consequences of ignoring responsible disclosure — paralleling Snapchat's dismissal of researcher warnings just one year earlier.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Moonpig API was remarkable not for the sophistication of the vulnerability but for its absence of any security whatsoever. There was no authentication (the API did not verify who was making the request), no authorisation (the API did not check whether the requester was permitted to access the requested data), no rate limiting (the API could be queried at machine speed), and no input validation on the customer ID parameter. This was not a subtle flaw — it was a complete absence of access control on a customer-facing API.
Moonpig is one of the UK's best-known online brands — millions of British customers use it for birthday cards, Valentine's cards, and personalised gifts. The revelation that every customer's personal data was accessible through an unauthenticated API was a significant privacy event for UK consumers. The ICO investigated and Moonpig remediated the vulnerability — but the 17-month gap between disclosure and fix meant that any attacker who discovered the vulnerability independently could have harvested the entire customer database without detection.
For UK e-commerce businesses, the Moonpig case is a direct warning: your mobile app's API is an attack surface that must be tested with the same rigour as your website. Our API penetration testing and mobile application testing assess authentication, authorisation, rate limiting, and data exposure. Cyber Essentials establishes baseline access controls. SOC in a Box monitors for API abuse patterns. And UK Cyber Defence provides incident response when API vulnerabilities are discovered or exploited.
Our <a href="/penetration-testing/api">API penetration testing</a> checks every endpoint for authentication, authorisation, IDOR, and rate limiting. Because if Moonpig — a UK household name — deployed an API with zero security, the question is what your API might be missing.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call