Back to Blog
Security Testing
January 15, 2024
8 min read

Page Admin Disclosure via an Upgraded Page Post

NorthQA TeamNorthQA Team

Overview

This article documents a privacy vulnerability discovered on Facebook that unintentionally disclosed page administrators through the "Life Events" feature when upgrading posts. This security finding demonstrates how seemingly innocuous features can inadvertently expose sensitive information about user roles and affiliations.

The Discovery

While posting content for a special event on one of my organization's Facebook Pages, I encountered an unusual behavior. Facebook prompted me with a message:

"It looks like something special happened. Want to make this post a life event?"

When I accepted this prompt and upgraded the post to a life event, I noticed something concerning: the action publicly disclosed my identity as one of the page admins through my personal profile's Life Events section.

Any Facebook user who visited my profile could click on this life event, which would redirect them directly to the Page Post, thus revealing my administrative role for that page.

The Problem

This behavior created several significant privacy and security concerns:

  • Unintended Admin Disclosure: Page administrators who wish to remain anonymous were inadvertently exposed
  • Public Visibility: The connection between the user's personal profile and their page admin role became publicly visible
  • No Clear Warning: Users were not adequately warned that upgrading a page post would create a public link on their personal profile
  • Professional/Personal Boundary: Organizations often keep admin identities private for security or professional reasons

Attack Scenarios

This vulnerability could be exploited in several ways:

  • Identify administrators of sensitive or controversial pages
  • Target specific individuals associated with organizations
  • Map organizational structures and key personnel
  • Conduct social engineering attacks against identified admins

How It Was Discovered

The issue was discovered during routine social media management activities when creating content for an organizational page. The upgrade prompt appeared to be a helpful feature to highlight important events. However, upon closer examination of the personal profile, the unintended disclosure became apparent.

The investigation followed these steps:

  1. Noticed the upgrade prompt when posting about a special event
  2. Accepted the life event upgrade without realizing the privacy implications
  3. Discovered the public disclosure when checking the personal profile
  4. Verified the behavior by testing with colleagues and alternative scenarios
  5. Documented the issue with screenshots and reproduction steps

Steps to Replicate

For security researchers and testers looking to understand this vulnerability, here's the detailed reproduction process.

Prerequisites

This test requires two Facebook accounts:

  • UserA: An account that manages a Facebook Page (page admin)
  • UserB: A test account representing a potential attacker or any Facebook user

Step 1: Create the Post (as UserA)

Using UserA, create a public post on the Page you are managing. Make sure the post is something congratulatory or noteworthy that would trigger the Life Event upgrade message from Facebook.

Step 2: Upgrade the Post (as UserA)

Once the post is published, you will notice a prompt message on top of it:

"It looks like something special happened. Want to make this post a life event?"

This prompt provides two options:

  • "No Thanks" — Declines the post being upgraded
  • "Upgrade Post" — Enables the post to be upgraded

Click the "Upgrade Post" button and supply the necessary details.

Step 3: Verify the Life Event (as UserA)

Navigate to your personal profile's About Section and Life Events:

  1. Go to: facebook.com/[username]/about?section=year-overviews
  2. Alternatively, go to your profile and scroll down to your Life Events section
  3. Verify that the Life Event you posted via your page is now listed there

Step 4: Exploit the Disclosure (as UserB)

UserB (the attacker) can now exploit the disclosure:

  1. Visit UserA's profile
  2. Click on any of UserA's Life Events
  3. Get redirected to the Page Post
  4. Confirm that UserA is an admin of that Page (since the page post is directly linked to UserA's personal account as a Life Event)

Expected vs. Actual Behavior

What Should Happen:

  • Page admin actions should remain separate from personal profile
  • Life Events on personal profiles should only reflect personal activities
  • Admin roles should not be publicly discoverable through indirect means

What Actually Happens (The Vulnerability):

  • Page posts could be upgraded to personal Life Events
  • This created a public link between the admin's personal profile and the managed page
  • Anyone could trace the connection and identify page administrators

Proof of Concept

A video demonstration of this vulnerability has been created to show the exact reproduction steps and the privacy disclosure in action.

Video Demonstration: Watch on YouTube

The video shows:

  • The initial page post creation
  • The "Upgrade to Life Event" prompt appearing
  • The upgrade process and required details
  • The Life Event appearing on the admin's personal profile
  • How any user can click the Life Event and be redirected to the page post
  • The clear connection revealing the admin relationship

Note: The video was created responsibly using test accounts where appropriate and was shared with Facebook's security team as part of the disclosure process.

Impact Assessment

As confirmed by Facebook's security team:

"This could have led to a page admin disclosure by upgrading a page post to a life event." — Facebook Security Team

Severity Analysis

The severity of this vulnerability ranges from Medium to High, depending on the context and sensitivity of the page being administered.

High Severity:

  • Pages managing sensitive content
  • Political organizations or advocacy groups
  • Controversial topics where admin anonymity is critical

Medium Severity:

  • Business pages and organizations where admin disclosure could lead to targeted harassment or social engineering

Low to Medium Severity:

  • Public-facing pages where admin roles are already known

Who Was Affected

This vulnerability impacted:

  • All page administrators across the Facebook platform
  • Organizations managing sensitive or controversial pages
  • Activists and advocacy groups who rely on admin anonymity
  • Users who value privacy regarding their organizational affiliations
  • Anyone managing multiple pages who wishes to keep admin roles private
  • Corporate social media managers who separate personal and professional identities

Potential Consequences

Privacy & Security Risks:

  • Identity exposure of page administrators who wish to remain anonymous
  • Targeted harassment or doxxing of identified admins
  • Social engineering attacks against identified administrators
  • Physical security risks for admins of controversial pages

Professional & Organizational Impact:

  • Professional repercussions from unwanted organizational affiliations being disclosed
  • Employer conflicts if managing pages outside of work
  • Competitive intelligence gathering by rivals identifying key personnel
  • Organizational security compromised through admin identification

Privacy & Compliance Concerns:

  • Privacy violations contrary to user expectations and consent
  • GDPR concerns regarding unintended personal data disclosure
  • Platform trust erosion when features behave unexpectedly

Responsible Disclosure Process

Following responsible disclosure best practices, the vulnerability was handled systematically:

  1. Identified the vulnerability during normal platform usage
  2. Documented the findings with detailed reproduction steps and screenshots
  3. Reported to Facebook through their bug bounty program
  4. Provided additional information as requested by the security team
  5. Awaited fix implementation before public disclosure
  6. Published disclosure after resolution and appropriate waiting period

How Facebook Fixed It

Facebook addressed this vulnerability by implementing the following changes:

  • Modified the life event creation flow for page posts
  • Added clearer warnings about public visibility
  • Provided better controls for users to manage what appears on their personal timeline
  • Ensured page admin actions don't automatically create public personal profile entries

If you were affected by this vulnerability:

  • Review your Life Events section for any unintended admin disclosures
  • Remove any life events that expose unwanted page affiliations
  • Be cautious when accepting similar prompts in the future

Key Takeaways

For Security Researchers:

  • Always examine edge cases in feature interactions
  • Consider privacy implications of seemingly innocent features
  • Test cross-feature interactions where personal and organizational data meet
  • Document everything during the discovery process

For Platform Developers:

  • Privacy by default should be the guiding principle
  • Clear warnings are essential when actions have privacy implications
  • User consent must be explicit for any public disclosures
  • Separate contexts between personal profiles and managed pages

For Users:

  • Be cautious with upgrade prompts and feature enhancements
  • Review privacy settings regularly, especially after accepting new features
  • Check your profile from a logged-out perspective to see what's public
  • Report unexpected behavior through proper channels

Technical Lessons

This vulnerability highlights several important security considerations:

Feature Creep and Privacy: New features can inadvertently compromise existing privacy assumptions. Developers must consider how new features interact with existing systems.

Context Boundaries: Clear separation between personal and professional/organizational contexts is crucial. When users perform actions in one context, those actions should not automatically affect another.

User Expectations: Users expect that their page admin actions remain isolated from their personal profiles. This expectation must be protected in design and implementation.

Informed Consent: Users need clear information about the consequences of their actions. Silent or unclear disclosures of sensitive information violate user trust.

Conclusion

This vulnerability demonstrates that even well-established platforms can have unexpected privacy issues arise from feature interactions. The "upgrade to life event" feature, while intended to enhance user engagement, inadvertently created a privacy leak that could expose page administrators.

The responsible disclosure process worked as intended, with Facebook acknowledging the issue and implementing a fix. This case serves as a reminder to both security researchers and users to remain vigilant about privacy implications, even with familiar platforms and seemingly benign features.

Disclosure Timeline

December 19, 2019 — Report Submitted

Initial vulnerability report submitted to Facebook's Bug Bounty Program through their responsible disclosure process.

January 9, 2020 — Triaged (21 days later)

After several discussions with the security team, the report was triaged and escalated to the appropriate product team.

Facebook Security Team Response:

"Hi Dan, Thanks for your patience and for reporting this information to us. We are sending it to the appropriate product team for further investigation. We will keep you updated on our progress. Thanks"

February 6, 2020 — Bug Fixed (28 days after triage)

Facebook's engineering team successfully deployed a fix to address the vulnerability. The fix included:

  • Modified life event creation flow for page posts
  • Enhanced privacy controls and warnings
  • Separation of page admin actions from personal profile timeline

February 7, 2020 — Bounty Awarded & Recognition (49 days total)

  • Bug Bounty Award: $3,000 USD
  • Recognition: Inducted into Facebook's 2019 Hall of Fame for responsible security research

This recognition acknowledges the importance of the finding and the professional manner in which it was reported and documented. The entire process from initial report to complete resolution took 49 days, demonstrating Facebook's commitment to addressing security and privacy issues promptly.

---

At NorthQA, we believe in responsible disclosure and thorough security testing. If your organization needs comprehensive security testing or QA services, contact us to learn how we can help protect your applications and users.

Need Help with Quality Assurance?

At NorthQA, we provide comprehensive software quality assurance services to ensure your applications are robust, reliable, and bug-free.

Get in Touch