UStrive, a nonprofit online mentorship platform that connects high school and college students with mentors, suffered a security lapse stemming from an improperly secured Amazon-hosted GraphQL endpoint. This architectural flaw permitted any logged-in user to query the backend database and retrieve non-public information belonging to other users.Â
The flaw was discovered through network traffic analysis. By inspecting browser traffic, an unauthorized logged-in user could execute queries to harvest structured data streams from the organization's servers.Â
At the time of data breach discovery, the accessible database contained approximately 238,000 user records, according to TechCrunch. The exposed dataset included personally identifiable information (PII) such as:
Following the responsible disclosure of the vulnerability, UStrive’s Chief Technology Officer, Dwamian Mcleish, stated late Thursday that the issue has been "remediated." However, the organization's legal representation indicated limitations in their response due to ongoing litigation with a former software engineer.Â
Despite the fix, UStrive has not committed to notifying the affected user base, nor has it clarified if forensic analysis was conducted to detect potential malicious exploitation prior to the patch. This lack of transparency regarding breach notification protocols highlights a critical gap in incident response management.