Unsecured JibJab server exposed users’ selfies, including children


This recording was made using enhanced software.

Summary

Public server

A cloud storage server used by JibJab was publicly accessible on the open internet.

Exposed selfies

The hacker who discovered the server believes millions of selfies, including those of children, were exposed.

JibJab aware?

An alleged email between the hacker and CEO suggests JibJab had been aware of the issue.


Full story

An unsecured server hosted by the widely used electronic greeting card company JibJab exposed users’ selfies, including those taken by children. The security researcher who discovered the issue, known as “BobDaHacker,” told Straight Arrow News that “millions of users’ faces” may have been left unprotected as a result.

As of October 2024, more than 84 million people had used JibJab. The service allows users to upload photos of their faces or others’ and place them in animated greeting card videos.

QR code for SAN app download

Download the SAN app today to stay up-to-date with Unbiased. Straight Facts™.

Point phone camera here

The photos, according to BobDaHacker, were left on a public-facing Amazon cloud storage server. Anyone with the server’s address could view or download the images without authorization. BobDaHacker provided SAN with links to numerous selfies, including one that appeared to have been taken by a young child.

Other data exposed on the server included the email addresses of those who’d been sent digital invitations by JibJab users.

Fix delayed

BobDaHacker alerted JibJab to the exposure in an email to CEO Paul Hanges. A screenshot of the correspondence shown to SAN suggests that JibJab had prior knowledge of the issue but had not resolved it.

“We actually are already aware of this and are planning to address it after our busy season,” Hanges wrote, according to the screenshot of an email.

BobDaHacker expressed concern over Hanges’ remark, given the apparent breadth of the exposure and the fact that the fix only required a simple settings change.

A gift card as bounty

Hanges also told BobDaHacker that JibJab doesn’t normally provide bounties to security researchers who alert them to vulnerabilities. Nevertheless, he offered BobDaHacker a lifetime membership to JibJab and a “small Amazon gift card” for his findings.

In the end, BobDaHacker says he was awarded $500. As of Wednesday, the server was no longer publicly accessible.

SAN sent multiple emails to JibJab to inquire about the issue, but did not receive a reply. SAN was unable to confirm exactly how many users were exposed or for how long. 

Alan Judd (Content Editor) and Mathew Grisham (Digital Producer) contributed to this report.
Tags: , , , ,

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Why this story matters

A security lapse at JibJab exposed millions of users' selfies, including those of children, raising concerns about data privacy, especially for minors using digital platforms.

Data privacy

Unsecured personal data, such as photos and email addresses, was left public, underscoring risks for users who trust online platforms with sensitive information.

Child safety online

Selfies of children were among the exposed content, highlighting ongoing issues related to protecting minors’ identities and privacy on digital platforms.

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Daily Newsletter

Start your day with fact-based news

Start your day with fact-based news

Learn more about our emails. Unsubscribe anytime.

By entering your email, you agree to the Terms and Conditions and acknowledge the Privacy Policy.