ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

OnlyFans empowers creators to own their full potential. OnlyFans is a place for creators from all genres and is committed to building the most inclusive and safest social media platform in the world. OnlyFans is a space for creators to express themselves freely, monetize content, and develop authentic connections with their fans. We continue to put power into the hands of creators by developing unparalleled opportunities for our community.

OnlyFans A.I CyberSecurity Scoring

OnlyFans

Company Details

Linkedin ID:

onlyfans

Employees number:

5,158

Number of followers:

74,207

NAICS:

71

Industry Type:

Entertainment Providers

Homepage:

onlyfans.com

IP Addresses:

0

Company ID:

ONL_7277606

Scan Status:

In-progress

AI scoreOnlyFans Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/onlyfans.jpeg
OnlyFans Entertainment Providers
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreOnlyFans Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/onlyfans.jpeg
OnlyFans Entertainment Providers
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

OnlyFans Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Mixpanel and Adult Platform: Pornhub Premium Hack: User Activity Data LeakedBreach85412/2025MixpanelMixpanel
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: **Cybersecurity Breach Exposes Sensitive Data of Adult Platform’s Premium Users** A cyberattack targeting an adult platform’s Premium service has sparked extortion threats and heightened privacy concerns after the hacking group *ShinyHunters* claimed to have stolen over 201 million records of user activity logs. The company confirmed the breach stemmed from a third-party analytics vendor, *Mixpanel*, but clarified that only Premium users were affected and that no passwords or payment details were exposed. The stolen data reportedly includes email addresses, search queries, video titles, timestamps, and IP-based geolocation—information that, while not directly financial, could enable de-anonymization, targeted phishing, or blackmail. *ShinyHunters* has allegedly used the dataset to pressure the company, mirroring tactics seen in past breaches involving sensitive content, such as the 2015 Ashley Madison hack. The incident underscores the risks of supply chain vulnerabilities, where even secure primary systems can be compromised through third-party integrations. While *Mixpanel* denied its systems were breached, the event highlights the dangers of unchecked telemetry data collection, which can inadvertently expose sensitive behavioral logs. Privacy advocates warn that such datasets can reveal personal preferences, relationships, or routines, making them prime targets for extortion. Regulatory scrutiny is likely, with potential investigations under laws like GDPR or California’s privacy statutes. The company has pledged to audit its analytics pipeline, reduce data retention, and implement stronger safeguards for personally identifiable information. For affected users, the breach serves as a reminder of the persistent risks tied to behavioral tracking—even when financial data remains secure.

Mixpanel and Adult Platform: Pornhub Premium Hack: User Activity Data Leaked
Breach
Severity: 85
Impact: 4
Seen: 12/2025
Blog:
Supply Chain Source: MixpanelMixpanel
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: **Cybersecurity Breach Exposes Sensitive Data of Adult Platform’s Premium Users** A cyberattack targeting an adult platform’s Premium service has sparked extortion threats and heightened privacy concerns after the hacking group *ShinyHunters* claimed to have stolen over 201 million records of user activity logs. The company confirmed the breach stemmed from a third-party analytics vendor, *Mixpanel*, but clarified that only Premium users were affected and that no passwords or payment details were exposed. The stolen data reportedly includes email addresses, search queries, video titles, timestamps, and IP-based geolocation—information that, while not directly financial, could enable de-anonymization, targeted phishing, or blackmail. *ShinyHunters* has allegedly used the dataset to pressure the company, mirroring tactics seen in past breaches involving sensitive content, such as the 2015 Ashley Madison hack. The incident underscores the risks of supply chain vulnerabilities, where even secure primary systems can be compromised through third-party integrations. While *Mixpanel* denied its systems were breached, the event highlights the dangers of unchecked telemetry data collection, which can inadvertently expose sensitive behavioral logs. Privacy advocates warn that such datasets can reveal personal preferences, relationships, or routines, making them prime targets for extortion. Regulatory scrutiny is likely, with potential investigations under laws like GDPR or California’s privacy statutes. The company has pledged to audit its analytics pipeline, reduce data retention, and implement stronger safeguards for personally identifiable information. For affected users, the breach serves as a reminder of the persistent risks tied to behavioral tracking—even when financial data remains secure.

Ailogo

OnlyFans Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for OnlyFans

Incidents vs Entertainment Providers Industry Average (This Year)

OnlyFans has 5.26% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

OnlyFans has 26.58% more incidents than the average of all companies with at least one recorded incident.

Incident Types OnlyFans vs Entertainment Providers Industry Avg (This Year)

OnlyFans reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — OnlyFans (X = Date, Y = Severity)

OnlyFans cyber incidents detection timeline including parent company and subsidiaries

OnlyFans Company Subsidiaries

SubsidiaryImage

OnlyFans empowers creators to own their full potential. OnlyFans is a place for creators from all genres and is committed to building the most inclusive and safest social media platform in the world. OnlyFans is a space for creators to express themselves freely, monetize content, and develop authentic connections with their fans. We continue to put power into the hands of creators by developing unparalleled opportunities for our community.

Loading...
similarCompanies

OnlyFans Similar Companies

SAG-AFTRA

With national offices in Los Angeles and New York, and local offices nationwide, SAG-AFTRA is the iconic American labor union that represents approximately 160,000 media professionals. Our members are the talented faces and voices that entertain and inform America and the world. They are actors, a

Netflix

Netflix is one of the world's leading entertainment services, with over 300 million paid memberships in over 190 countries enjoying TV series, films and games across a wide variety of genres and languages. Members can play, pause and resume watching as much as they want, anytime, anywhere, and can c

Walt Disney World

The Walt Disney World® Resort features four theme parks — the Magic Kingdom® Park, Epcot®, Disney's Hollywood Studios™, and Disney's Animal Kingdom® Theme Park. More than 20 resort hotels are on-site, offering several thousand rooms of themed accommodations. The nearly 40-square-miles of the Walt Di

Universal Music Group

Universal Music Group (UMG) is the world leader in music-based entertainment, with a broad array of businesses engaged in recorded music, music publishing, merchandising and audiovisual content in more than 60 countries. Featuring the most comprehensive catalog of recordings and songs across every m

Live Nation Entertainment

Recognized three years in a row by Great Place to Work® and named one of People Magazine’s Top 50 Companies that Care, Live Nation Entertainment is the global leader in live events and ticketing. With business operations and corporate functions across major divisions including Ticketmaster, Concerts

Electronic Arts (EA)

Electronic Arts creates next-level entertainment experiences that inspire players and fans around the world. Here, everyone is part of the story. Part of a community that connects across the globe. A team where creativity thrives, new perspectives are invited, and ideas matter. Regardless of your ro

Sony’s purpose is simple. We aim to fill the world with emotion, through the power of creativity and technology. We want to be responsible for getting hearts racing, stirring ambition, and putting a smile on the faces of our customers. That challenge, combined with our spirit of innovation, motivate

Dave & Buster's Inc.

Welcome to Dave & Buster's, the ONLY place to Eat, Drink, Play & Watch Sports®, all under one roof! Here, you can immerse yourself in a world of excitement, from our Million Dollar Midway, packed with the hottest arcade games, to our mouth-watering, chef-crafted creations served in our American rest

NBCUniversal

NBCUniversal is one of the world's leading media and entertainment companies. We create world-class content, which we distribute across our portfolio of film, television, and streaming, and bring to life through our theme parks and consumer experiences. We own and operate leading entertainment and n

newsone

OnlyFans CyberSecurity News

November 02, 2025 07:00 AM
“What's your OnlyFans?”: Paulina Gretzky blasted for provocative Halloween outfit and sexualizing childho

NHL News: Paulina Gretzky's Halloween costume as Jessie from Toy Story sparked immediate online debate, drawing comparisons to Kendall...

November 01, 2025 07:00 AM
Italy will be the latest country to require age verification for porn sites

Italy will require users to verify their age before getting on porn sites, starting on November 12.

October 01, 2025 07:00 AM
OnlyFans DMCA Takedown: How Creators Can Protect Their Content

OnlyFans is becoming one of the fastest-growing platforms for digital creators. It allows them to connect directly with fans and monetize...

September 02, 2025 07:00 AM
The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The fight against online piracy using automated algorithms is causing massive errors and removing innocent content from the Internet.

August 07, 2025 07:00 AM
Is OnlyFans safe? A complete guide for users and creators

Explore how safe OnlyFans really is. Get insights on platform security, content risks, user anonymity, and protecting your personal info.

July 31, 2025 07:00 AM
OnlyFans, Discord ClickFix-Themed Pages Spread Epsilon Red Ransomware

A sophisticated new ransomware campaign is actively tricking internet users around the world by employing fake verification pages to spread...

July 04, 2025 07:00 AM
How To See OnlyFans Videos Without Subscription: 5 Methods

Fix Windows errors with Fortect: Fortect can repair common computer errors by scanning your entire system for damaged or missing OS files...

June 09, 2025 07:00 AM
"OnlyFans for the poor." How "slutbots" on Telegram massively generate spam, how dangerous it is and what is behind it. We wrote to the "girls" in private and interviewed experts

In recent months, we have been seeing accounts with openly sexual photos on our Telegram channel dev.ua. They have been actively commenting...

April 02, 2025 07:00 AM
Men sus of OnlyFans models. Now they want to sue

Two men are suing the adults-only site OnlyFans, after the pair became suspicious that they weren't talking to real models.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

OnlyFans CyberSecurity History Information

Official Website of OnlyFans

The official website of OnlyFans is http://www.onlyfans.com.

OnlyFans’s AI-Generated Cybersecurity Score

According to Rankiteo, OnlyFans’s AI-generated cybersecurity score is 661, reflecting their Weak security posture.

How many security badges does OnlyFans’ have ?

According to Rankiteo, OnlyFans currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does OnlyFans have SOC 2 Type 1 certification ?

According to Rankiteo, OnlyFans is not certified under SOC 2 Type 1.

Does OnlyFans have SOC 2 Type 2 certification ?

According to Rankiteo, OnlyFans does not hold a SOC 2 Type 2 certification.

Does OnlyFans comply with GDPR ?

According to Rankiteo, OnlyFans is not listed as GDPR compliant.

Does OnlyFans have PCI DSS certification ?

According to Rankiteo, OnlyFans does not currently maintain PCI DSS compliance.

Does OnlyFans comply with HIPAA ?

According to Rankiteo, OnlyFans is not compliant with HIPAA regulations.

Does OnlyFans have ISO 27001 certification ?

According to Rankiteo,OnlyFans is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of OnlyFans

OnlyFans operates primarily in the Entertainment Providers industry.

Number of Employees at OnlyFans

OnlyFans employs approximately 5,158 people worldwide.

Subsidiaries Owned by OnlyFans

OnlyFans presently has no subsidiaries across any sectors.

OnlyFans’s LinkedIn Followers

OnlyFans’s official LinkedIn profile has approximately 74,207 followers.

NAICS Classification of OnlyFans

OnlyFans is classified under the NAICS code 71, which corresponds to Arts, Entertainment, and Recreation.

OnlyFans’s Presence on Crunchbase

No, OnlyFans does not have a profile on Crunchbase.

OnlyFans’s Presence on LinkedIn

Yes, OnlyFans maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/onlyfans.

Cybersecurity Incidents Involving OnlyFans

As of December 27, 2025, Rankiteo reports that OnlyFans has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

OnlyFans has an estimated 7,334 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at OnlyFans ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does OnlyFans detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with auditing event schemas, reducing data retention, removing/hashing pii in analytics, and communication strategy with public disclosure via company statement and media outlets..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Adult Platform Premium Service Data Breach and Extortion Threat

Description: A hack directed at the adult platform’s Premium service has led to extortion threats and new privacy fears, as a hacking gang claims it stole a large dataset of customer activity logs. The company confirmed an incident involving a third-party analytics vendor, stating that only some Premium users were impacted and no passwords or payment information was exposed.

Type: Data Breach

Attack Vector: Third-party analytics vendor (supply chain attack)

Vulnerability Exploited: Supply chain weakness in analytics data handling

Threat Actor: ShinyHunters

Motivation: Extortion, data monetization on dark web

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Third-party analytics vendor (Mixpanel).

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach MIXONL1766496633

Data Compromised: 201,211,943 records of user activity logs

Systems Affected: Third-party analytics vendor (Mixpanel)

Operational Impact: Potential reputational damage, regulatory scrutiny

Brand Reputation Impact: High (sensitive behavioral data exposure)

Legal Liabilities: Potential under GDPR, CCPA, or other privacy laws

Identity Theft Risk: Moderate (de-anonymization risk via behavioral data)

Payment Information Risk: None (no payment data exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are User Activity Logs, Behavioral Telemetry and .

Which entities were affected by each incident ?

Incident : Data Breach MIXONL1766496633

Entity Name: Adult Platform (unnamed)

Entity Type: Online adult content platform

Industry: Adult Entertainment

Customers Affected: Premium users (subset of total user base)

Incident : Data Breach MIXONL1766496633

Entity Name: Mixpanel

Entity Type: Third-party analytics provider

Industry: Data Analytics

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach MIXONL1766496633

Remediation Measures: Auditing event schemas, reducing data retention, removing/hashing PII in analytics

Communication Strategy: Public disclosure via company statement and media outlets

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach MIXONL1766496633

Type of Data Compromised: User activity logs, Behavioral telemetry

Number of Records Exposed: 201,211,943

Sensitivity of Data: High (intimate behavioral data)

Data Exfiltration: Yes (alleged by ShinyHunters)

Personally Identifiable Information: Email addressesGeographic information (IP-based)Timestamps of activity

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Auditing event schemas, reducing data retention, removing/hashing PII in analytics.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach MIXONL1766496633

Regulations Violated: Potential GDPR, Potential CCPA,

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Data Breach MIXONL1766496633

Lessons Learned: Supply chain risks in third-party analytics, importance of data minimization, and the sensitivity of behavioral logs when combined with PII.

What recommendations were made to prevent future incidents ?

Incident : Data Breach MIXONL1766496633

Recommendations: Audit and tighten analytics data pipelines to prevent sensitive data exposure., Implement data minimization practices (e.g., hashing PII, reducing retention periods)., Enhance user communication about phishing risks and extortion attempts., Encourage users to adopt security best practices (e.g., 2FA, unique passwords, email aliases)., Prepare for potential regulatory inquiries and legal actions.Audit and tighten analytics data pipelines to prevent sensitive data exposure., Implement data minimization practices (e.g., hashing PII, reducing retention periods)., Enhance user communication about phishing risks and extortion attempts., Encourage users to adopt security best practices (e.g., 2FA, unique passwords, email aliases)., Prepare for potential regulatory inquiries and legal actions.Audit and tighten analytics data pipelines to prevent sensitive data exposure., Implement data minimization practices (e.g., hashing PII, reducing retention periods)., Enhance user communication about phishing risks and extortion attempts., Encourage users to adopt security best practices (e.g., 2FA, unique passwords, email aliases)., Prepare for potential regulatory inquiries and legal actions.Audit and tighten analytics data pipelines to prevent sensitive data exposure., Implement data minimization practices (e.g., hashing PII, reducing retention periods)., Enhance user communication about phishing risks and extortion attempts., Encourage users to adopt security best practices (e.g., 2FA, unique passwords, email aliases)., Prepare for potential regulatory inquiries and legal actions.Audit and tighten analytics data pipelines to prevent sensitive data exposure., Implement data minimization practices (e.g., hashing PII, reducing retention periods)., Enhance user communication about phishing risks and extortion attempts., Encourage users to adopt security best practices (e.g., 2FA, unique passwords, email aliases)., Prepare for potential regulatory inquiries and legal actions.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Supply chain risks in third-party analytics, importance of data minimization, and the sensitivity of behavioral logs when combined with PII.

References

Where can I find more information about each incident ?

Incident : Data Breach MIXONL1766496633

Source: BleepingComputer

Incident : Data Breach MIXONL1766496633

Source: Company Statement

Incident : Data Breach MIXONL1766496633

Source: Mixpanel Statement

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Company Statement, and Source: Mixpanel Statement.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach MIXONL1766496633

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via company statement and media outlets.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach MIXONL1766496633

Stakeholder Advisories: Users advised to be wary of extortion emails, enable 2FA, and change passwords.

Customer Advisories: Do not respond to extortion emails claiming to have your viewing history.Report phishing attempts to email providers and cybercrime units.Change account passwords and enable two-factor authentication.Use email aliases for sensitive subscriptions.Avoid logging in via unsolicited links.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Users advised to be wary of extortion emails, enable 2FA, and change passwords., Do Not Respond To Extortion Emails Claiming To Have Your Viewing History., Report Phishing Attempts To Email Providers And Cybercrime Units., Change Account Passwords And Enable Two-Factor Authentication., Use Email Aliases For Sensitive Subscriptions., Avoid Logging In Via Unsolicited Links. and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach MIXONL1766496633

Entry Point: Third-party analytics vendor (Mixpanel)

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach MIXONL1766496633

Root Causes: Inadequate data minimization in analytics pipelines, supply chain vulnerability via third-party vendor.

Corrective Actions: Audit Event Schemas For Sensitive Data., Reduce Data Retention Periods., Hash Or Remove Pii From Analytics Data., Enhance Monitoring Of Third-Party Data Flows.,

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Audit Event Schemas For Sensitive Data., Reduce Data Retention Periods., Hash Or Remove Pii From Analytics Data., Enhance Monitoring Of Third-Party Data Flows., .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an ShinyHunters.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were 201,211 and943 records of user activity logs.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 201,211 and943 records of user activity logs.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 201.2M.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Supply chain risks in third-party analytics, importance of data minimization, and the sensitivity of behavioral logs when combined with PII.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Audit and tighten analytics data pipelines to prevent sensitive data exposure., Enhance user communication about phishing risks and extortion attempts., Prepare for potential regulatory inquiries and legal actions., Encourage users to adopt security best practices (e.g., 2FA, unique passwords, email aliases)., Implement data minimization practices (e.g., hashing PII and reducing retention periods)..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Company Statement, Mixpanel Statement and BleepingComputer.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Users advised to be wary of extortion emails, enable 2FA, and change passwords., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Do not respond to extortion emails claiming to have your viewing history.Report phishing attempts to email providers and cybercrime units.Change account passwords and enable two-factor authentication.Use email aliases for sensitive subscriptions.Avoid logging in via unsolicited links.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Third-party analytics vendor (Mixpanel).

cve

Latest Global CVEs (Not Company-Specific)

Description

n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke internal helper functions from within the Code node. This allows a workflow editor to perform actions on the n8n host with the same privileges as the n8n process, including: reading files from the host filesystem (subject to any file-access restrictions configured on the instance and OS/container permissions), and writing files to the host filesystem (subject to the same restrictions). This issue has been patched in version 2.0.0. Workarounds for this issue involve limiting file operations by setting N8N_RESTRICT_FILE_ACCESS_TO to a dedicated directory (e.g., ~/.n8n-files) and ensure it contains no sensitive data, keeping N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES=true (default) to block access to .n8n and user-defined config files, and disabling high-risk nodes (including the Code node) using NODES_EXCLUDE if workflow editors are not fully trusted.

Risk Information
cvss3
Base: 7.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Description

n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Description

LMDeploy is a toolkit for compressing, deploying, and serving LLMs. Prior to version 0.11.1, an insecure deserialization vulnerability exists in lmdeploy where torch.load() is called without the weights_only=True parameter when loading model checkpoint files. This allows an attacker to execute arbitrary code on the victim's machine when they load a malicious .bin or .pt model file. This issue has been patched in version 0.11.1.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=onlyfans' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge