ClickUp Hardcoded API Key Exposes Almost 1,000 Customer Emails, Including Government and Corporate Giants

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Hardcoded API exposure: A ClickUp API key leak exposed nearly a thousand corporate and government emails via an unauthenticated JavaScript file on its homepage.
  • Critical organizations affected: This corporate email exposure impacts employees at major security firms like Fortinet and Tenable, creating severe data security risks.
  • Unpatched security flaw: Reported via HackerOne in January 2025, this preventable cybersecurity vulnerability remains active and unrotated after 15 months in production.

A publicly accessible JavaScript file on the ClickUp homepage has silently leaked 959 email addresses alongside 3,165 internal feature flags. A hardcoded third-party API key embedded in the source code was recently observed, loading before any user authentication occurs.

This massive corporate email exposure impacts workers across well-known companies, U.S. and other governments, and ClickUp itself.

Severe Corporate Email Exposure

A researcher said they could extract these sensitive assets by executing a single unauthenticated GET request, CybersecurityNews has reported. The leak compromises personnel at global enterprise firewall manufacturer Fortinet and Tenable, the developer behind the Nessus vulnerability scanner. 

Unauthenticated GET request exposing ClickUp email addresses | Source: impulsive on X
Unauthenticated GET request exposing ClickUp email addresses | Source: impulsive on X

Affected individuals reportedly include employees from:

The exposure also impacts government workers from Wyoming, Arkansas, North Carolina, Montana, Queensland (Australia), and New Zealand, as well as 71 internal ClickUp employees and a Microsoft contractor.

Escalating Data Security Risks

Despite being reported to ClickUp through HackerOne on January 17, 2025, this critical cybersecurity vulnerability remains unpatched in production as of late April 2026, the researcher said, adding that the API key has not been rotated over the past 15 months. 

Exposing email addresses from top-tier cybersecurity organizations creates a direct attack surface. Furthermore, the leaked feature flags reveal internal product development signals and beta configurations.

In September 2025, Tenable confirmed a data breach resulting from a compromise of Salesloft and Drift. In February, threat actors leveraged several commercial AI tools to breach 600 FortiGate firewalls.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: