Flickr’s 35M Users Affected by Third-Party Data Exposure

Image: San Francisco Chronicle via Getty Images

Flickr has begun notifying users about a potential data exposure tied to a vulnerability in a third-party email service provider.

Flickr’s 35M Users Affected by Third-Party Data Exposure

Flickr’s 35M Users Affected by Third-Party Data Exposure

Flickr has begun notifying users about a potential data exposure tied to a vulnerability in a third-party email service provider.

The incident highlights the security considerations associated with third-party services, even when a platform’s core systems are not directly affected.

“On February 5, 2026, we were alerted to a vulnerability in a system operated by one of our email service providers,” Flickr said in emails to affected users, as reported by BleepingComputer.

Details of the Flickr data exposure

According to Flickr, the vulnerability was identified on Feb. 5, 2026, in a system operated by one of its third-party email service providers. The company said it moved quickly to contain the issue, shutting down access to the affected system within hours of being notified.

As Bleeping Computer reported, Flickr has not disclosed which provider was involved or how many users may have been affected, but the platform reports approximately 35 million monthly users and hosts more than 28 billion photos and videos, underscoring the potential scale of exposure.

The data potentially accessed includes users’ real names, email addresses, Flickr usernames, account types, IP addresses, general location information, and details related to account activity.

Flickr emphasized that no passwords or payment card information were compromised, limiting the immediate risk of account takeover or direct financial fraud. However, the exposure of contact and account metadata continues to raise significant privacy and security concerns.

While Flickr has not disclosed technical details about the root cause, email service providers commonly store user metadata for account notifications and communications, making them attractive targets for attackers seeking large volumes of data without breaching core systems.

There is no indication that the vulnerability is being actively exploited or that publicly available proof-of-concept code exists.

However, exposure of email addresses and account metadata can still increase the risk of follow-on phishing and social engineering attacks that leverage legitimate platform details.

Reducing risk from third-party services

Incidents involving third-party services highlight the need for organizations to look beyond their own environments when managing security risk.

Even when core systems remain secure, weaknesses in external providers can expose data and lead to follow-on threats.

To reduce the impact of these events, organizations should take a layered approach that combines preventive controls, continuous monitoring, and response readiness.

  • Strengthen third-party risk management by regularly assessing vendor security controls, monitoring posture changes, and enforcing clear contractual security requirements.
  • Apply least-privilege access and data minimization principles to third-party integrations, including segmentation and strict access expiration controls.
  • Reduce the impact of data exposure by tokenizing, masking, or anonymizing sensitive user data shared with external service providers.
  • Enhance logging, auditing, and continuous monitoring of third-party access to detect anomalous activity and potential data misuse earlier.
  • Mitigate credential-based risk by enforcing multi-factor authentication, discouraging password reuse, and improving overall credential hygiene.
  • Prepare for downstream threats by monitoring for phishing campaigns and delivering targeted user awareness guidance following exposure events.
  • Test and refine incident response plans through regular tabletop exercises and simulations that include third-party breach scenarios.

The Flickr incident highlights the ongoing security considerations associated with third-party services, even for established platforms with mature internal controls.

Although the immediate impact appears limited, exposure of user contact and account metadata can still introduce downstream risks.

This article originally appeared on our sister website, eSecurityPlanet.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.