Severity: 🚨 High
Perplexity AI (https://www.perplexity.ai)
Perplexity AI Web Application
2.51.0 (GPT-4)
Shared Chat Session URLs (/search/<token> endpoint)
Perplexity AI includes chat tokens directly in the URL when users share chat sessions. These tokens are not protected by authentication or expiration controls. As a result, anyone who captures the URL (and its token) can access the full chat history — even outside the original session.\
- Token is exposed directly in the browser URL (GET request).
- Stored in:
- Browser history
- Referrer headers
- Server logs
- Network logs
- Analytics and tracking tools
- Anyone with a valid token can view the chat — no login or identity check required.
- Tokens remain permanently valid unless manually deleted.
- No access logging or notification for the original user.
Tokens can be leaked or intercepted via:
- 🔍 Browser history
- 🔗 HTTP
Refererheaders - 🌐 Unsecured network traffic (e.g., using Wireshark)
- 📋 Clipboard sharing
- 📁 Proxy or server logs (e.g., NGINX, Cloudflare)
- 🧭 Auto-filled URLs and cached tabs
- ❌ No expiration on shared links
- ❌ No revocation mechanism
- ❌ No rate limiting or brute-force protection
- ❌ No visibility controls or warning to user
https://www.perplexity.ai/search/
Example token: hi-RxWG5knCTUurDLABy27PMg
- Log in to your Perplexity AI account (or proceed as a guest).
- Obtain or observe another user's chat token (e.g., via shared link or recon).
- Paste a modified URL such as: https://www.perplexity.ai/search/hi-RxWG5knCTUurDLABy27PMg
- Open the link in incognito mode (even without being logged in).
- Observe that the chat history of another user is accessible without authentication.
- Unauthorized access to sensitive chatbot content, including:
- Legal, medical, or financial questions
- Personally identifiable information (PII)
- Corporate or proprietary information
- Severe privacy breach, especially if shared unknowingly
- Regulatory compliance risks, including:
- GDPR (Article 5, 32 – confidentiality & data minimization)
- CCPA (user data protection and unauthorized access)
HIGH
This vulnerability allows data leakage across accounts and users with no validation. The simplicity of exploitation increases its impact.
- Performed successfully in incognito mode.
- No login required to retrieve another user's chat via token.
- Confirmed repeatable with multiple valid tokens.
- The link is accessed by someone else (via referrer leak, history, logs, etc.).
- The full conversation is visible — no authentication required.
