Statement Regarding API Security Incident | OpenReview
Statement Regarding API Security Incident Super User 27 Nov 2025 (modified: 27 Nov 2025) OpenReview News Article Everyone Revisions CC BY 4.0 Article : At 10:09 AM EST today the OpenReview team was notified by the ICLR Workflow Chair of a security vulnerability in our API that allowed unauthorized access to the identities of normally anonymous roles (reviewers, authors, and area chairs) across venues through a specific profile search API endpoint. A software patch blocking unauthorized access was deployed within one hour of the initial report. Timeline of Response: 10:09 AM: Issue reported by ICLR 2026 Workflow Chair 10:12 AM: OpenReview team acknowledged receipt and began investigation 11:00 AM: Fix deployed to api.openreview.net 11:08 AM: Fix deployed to api2.openreview.net 11:10 AM: Program Chairs and Workflow Chair notified of resolution The vulnerability allowed queries to the profiles/search endpoint using the "group" parameter in an unintended fashion to return identity information without proper authorization checks. Current Actions: We are conducting a thorough analysis of API call logs to understand the full extent of what sensitive information was probed and identify which accounts obtained this data (particularly those making large-scale queries). We will be contacting multi-national law enforcement agencies about consequences for this behavior. We will be notifying all affected deanonymized users by email and will issue additional detailed public reports about this incident in the days ahead. Exploitation Consequences: Any use, exploitation, or sharing of the leaked information is a violation of OpenReview's Terms of Use ( https://openreview.net/legal/terms ) and may result in OpenReview account suspension. Doxxing, harassment, or any form of retaliation (whether online or in person) will not be tolerated, and will result in maximum penalties defined by the Terms of Use. We note that OpenReview Terms of Use prohibit circumvention of intended data readability rules, and also require that “If any User discovers an apparent security bug in the OpenReview System, the User must report the bug promptly by email to info@openreview.net , and not share information about the bug with others.” Publication venues may impose additional penalties as defined by their codes of conduct. Looking forward: If you have information about violations of our Terms of Use or have concerns about this incident, please contact the OpenReview Policy mailing list at policy@openreview.net . We take this incident very seriously and are reviewing our security protocols to prevent similar issues in the future. We deeply apologize for this vulnerability and thank the community members who reported it promptly, enabling our rapid response. We understand that author and reviewer anonymity are an essential pillar of a thriving peer review ecosystem, and we acknowledge that we have fallen short of our own and your expectations. We are committed to continuing to improve our system and service. Good will, integrity, and thoughtful dialog in scientific communities is precious and delicate. We encourage everyone to uphold these norms by acting ethically, reporting concerns promptly, and supporting a culture where fairness and transparency can thrive. We all have a role to play in engaging one another with care, candor, and respect, especially in moments when our systems and norms are tested. The OpenReview Team Loading
Executive Summary
The OpenReview team recently experienced a security vulnerability in their API, allowing unauthorized access to the identities of normally anonymous roles. The vulnerability was reported by the ICLR Workflow Chair and was promptly addressed with a software patch. The team is conducting a thorough analysis of API call logs and will notify affected users and law enforcement agencies. This incident highlights the importance of robust security protocols and the need for timely reporting of security vulnerabilities.
Key Points
- ▸ The OpenReview API experienced a security vulnerability allowing unauthorized access to identities of anonymous roles
- ▸ The vulnerability was reported by the ICLR Workflow Chair and addressed with a software patch within one hour
- ▸ The OpenReview team is conducting a thorough analysis of API call logs and will notify affected users and law enforcement agencies
Merits
Timely Response
The OpenReview team's prompt response to the security vulnerability demonstrates their commitment to addressing security concerns in a timely manner, minimizing potential damage and protecting user data.
Transparency
The OpenReview team's public statement regarding the incident demonstrates transparency and accountability, providing users with essential information about the vulnerability and their response.
Demerits
Lack of Prior Security Measures
The incident highlights the importance of robust security protocols and the need for regular security audits to prevent similar vulnerabilities in the future.
Potential for Future Incidents
The incident raises concerns about the potential for future security vulnerabilities, emphasizing the need for ongoing security measures and continuous monitoring of the API.
Expert Commentary
The OpenReview incident serves as a stark reminder of the importance of robust API security measures and the need for continuous monitoring and auditing to prevent similar vulnerabilities. The team's prompt response and transparency demonstrate their commitment to addressing security concerns in a timely manner. However, the incident also highlights the need for ongoing security measures and regular security audits to prevent similar vulnerabilities in the future. As the academic community increasingly relies on online platforms for peer review and collaboration, the importance of robust security protocols and data protection measures cannot be overstated.
Recommendations
- ✓ Develop and implement robust security protocols and continuous monitoring measures to prevent similar vulnerabilities.
- ✓ Establish clear guidelines and regulations for API security and data protection, including regular security audits and timely reporting of security vulnerabilities.