Critical vulnerability in AI coding platform Base44 allowing unauthorized access
75 comments
·July 30, 2025toddmorey
subw00f
Prepare for a whole new era of step backs when everyone is a “prompt engineer”.
andersa
How nice to know they will be implementing the mandatory age verification systems for this new generation of the internet!
Cthulhu_
At least they're costly mistakes that a new generation of decision makers will hopefully learn from.
null
roozbeh18
20 years ago the school class enrollment website allowed just that by changing account IDs in URL, we were bypassing the priority enrollment. I had fun adding my friends and I to classes we wanted.
cj
I took a slightly different approach and simply wrote a script that checked availability every minute, and then sent me a text message alert when a seat opened up.
(Upperclassmen often switched their schedules around after the priority enrollment deadline ended)
Not as bullet proof as your approach!
doawoo
Incredible, my university class reg system had un-sanitized input for the class search field so if you knew the SQL you could find exactly how full a class was and dump the whole table of classes without needing to wait for your reg to open.
And pretty sure you could insert your student ID into the class that way too :)
ashton314
Heck you could probably just kick people out of the class that you didn't want to take it with.
cwmoore
That’s useful. But 30 years ago you could iterate Social Security Numbers.
captn3m0
I reported a security vulnerability yesterday, which amounts to a admin=true cookie bypass.
srcport56445
Have we really made "progress" ? Even in 2000 I doubt people were allowed to walk into a bank and look at everyone's account details.
NoPicklez
Well we have because that vulnerability in websites is formally recognized in OWASP and has been fairly well eradicated since then.
dpoloncsak
...How long did it take a transfer to settle in the 2000s
manquer
Well…
cash was and is still instant.
When doing large enough transactions that makes cash cumbersome, the slowness is a feature not a bug. We would want multiple reviews and time before it settled.
The value of $100 bill was much higher in 2000 and in 1969 when it became the highest denomination in circulation, so you could transact much higher value with a “wad of cash” than today.
Before 1969 we had bills up to $10,000 for a reason, they served like a credit note/T-Bill from the government, they were no longer needed after banking became robust enough for Cheques/P-Notes etc to replace them.
Paper Cash or Gold/silver coins before them are well understood solved problems, with thousands of years of experiments on size, security ,seigniorage and so on.
null
toast0
Wires have been fast, during banking hours, for a long time. Expensive, though.
zamalek
Hot on the wheels on the vibe-coded Tea breach. Things are looking great for vibe coding.
Don't get me wrong, I have been been more hands off (though not completely, and very prescriptive) with an SPA side project and it's going great. Claude makes way better looking UIs than my dog ugly developer UIs. But vibing auth? That should seriously count as _legal_ gross negligence.
jerf
At the moment, I would call "writing secure code that can be put on the internet" to be a super-human task. That is, even our most highly skilled human beings currently can't be blindly trusted to accomplish it; it requires review by teams of experts. We already don't even trust humans, so trusting AIs for the forseeable future (as much as "the forseeable future" may be contracting on us) is not something we should be doing.
And so as to avoid the reader binning this post into "oh just some human triumphalist AI denier", remember I just said I don't trust individual humans on this point either. Everyone, even experts at coding secure code, should be reviewed by other experts at this point.
I suspect this is going to prove to be something that LLMs can't do reliably, by their architecture. It's going to be a next-generation AI thing, whatever that may prove to be.
FiniteIntegral
Agreed. Security is a task that not even a group of humans can perform with upmost scrutiny or perfection. 'Eternal vigilance is the price of liberty' and such. People want to move fast and break things without the backing infrastructure/maintenance (like... actually checking what the AI wrote).
runlaszlorun
Ah yes... Move face and break things. Well Facebook didn't overpromise on that one...
_fat_santa
I'm not sure I would even call what happened with Tea a breach. They just straight up didn't have any authentication around those endpoints.
sunaookami
The Tea breach was not due to vibe-coding btw, the code was from the beginning of 2024 when vibe coding wasn't even possible.
bluefirebrand
Just because no one had coined the term vibe coding yet doesn't mean people weren't trying what would eventually be called vibe coding
We had LLMs in 2024 that you could certainly try vibe coding with, but probably shouldn't have
Just like we have LLMs today that you can certainly try vibe coding with but probably shouldn't
cwmoore
Wasn’t that default public-accessible Firebase?
QuadmasterXLII
Vibe coding started working in summer 2023, see e.g. https://github.com/HastingsGreer/jstreb/blob/1ccedf82ec463dc...
the spectacular overcommenting has been here the whole time
Progress since then has mostly been people and tools catching up to the models, the limit of what the models can code has been pretty stagnant the last couple years
ryandrake
Whether it's strictly Vibe Coding™ or traditional coding by an incompetent amateur, the result is the same: defective and vulnerable slop.
Sherveen
Oh great, let's just say terms whenever, as long as they are adjacent in meaning to whatever we really mean. SMART!
dingnuts
By Karpathy's definition it still isn't possible. But I've definitely been hearing about AI generated code being just as good as my code since 2022.
Don't gaslight us about timelines. The boosters have been telling us amateurs can code and we're all worthless for three and a half years now.
When ChatGPT was launched, they said we'd all be on the streets by now.
What I don't understand is the gleeful receipt of that news by some programmers
bluefirebrand
> What I don't understand is the gleeful receipt of that news by some programmers
I know there are very likely programmers that are gleeful about it, but I suspect that many of the gleeful voices we hear online are not programmers and are resentful of that fact
I see this a lot with the type of people who are making AI "artwork". They often lacked the discipline to practice and learn to make art themselves, they seem to bear an underlying resentment to people who do make art. They are the sort of people who think making art is tied to some innate talent and not something that you can practice. Now they are gleeful about AI generators because it lets them create the pictures in their head without the effort of learning a skill, and they are celebrating that they no longer suffer under the tyranny of people who actually enjoy drawing and painting
janalsncm
Pretty much. We are almost four years into “LLMs will make SWEs obsolete in 6 months” now. Turns out, most tools that let amateurs write bad code let pros write better code.
IanCal
Nothing here says auth was vibe coded. It’s a platform for vibe coding.
zamalek
From the founder himself: https://www.lennysnewsletter.com/p/the-base44-bootstrapped-s...
loupol
There's also nothing saying they are not dog fooding at least a little bit.
bee_rider
I wonder to what extent the vibe coding folks are dogfooding. Their platforms seem too basically work in the sense that they spit out some kind of code, so I guess there must not be too much dogfooding going on.
IanCal
There’s nothing saying they didn’t do this deliberately, but it’d still be an unsubstantiated accusation to say that’s why there was a problem with auth.
belter
"Vulnerability discovered in Google Gemini CLI, patch required" - https://www.techzine.eu/news/security/133402/vulnerability-d...
steveBK123
I only know Base44 from the bombardment of YouTube ads for them I receive. Glad to hear its going well.
xdfgh1112
Me too. They make it seem like you can vibe code an entire web shop in one prompt. In reality they charge by the token so if you hit a wall trying to get the AI to do stuff you run up a huge bill but it's too late to get out.
toddmorey
This is so true. I've ONLY heard them mentioned from their own ads, never even once in the wild. Must be one hell of an ad budget.
Frieren
For AI companies visibility is more important than the actual product. This is a characteristic of many bubbles were getting the word out is the only thing needed to get investors. Investors are scrambling to put as much money in AI as possible, so quality is not a concern for "entrepreneurs".
esafak
It looks like they blew their budget on ads instead of engineers :)
steveBK123
Just checking back in here to note I am legitimately considering a Youtube sub just to make the Base44 ads go away. So the ads are having some impact!
koakuma-chan
Why not use an Adblock?
swyx
oh interesting. do you think that was a big part of their growth strategy pre acquisition or did the ads only pick up post acquisition?
sandeepkd
I might go to the extent of saying that this is classical example of security by obscurity, and for good or bad reasons, a lot of applications would fall into this category, one way or another.
zahlman
> Platforms like Loveable, Bolt, and Base44 > Wiz Research has been looking into the security posture > (recently acquired by Wix following an amazingly rapid rise)
Anyone else find all these names really surreal?
(Yeah, Google is kind of a dumb name too, but at least there's a cute story behind it.)
(Okay, I knew Wix had been around for quite some time, but I didn't expect it to be almost as old as YouTube....)
an0malous
It’ll get more surreal because the supply of domains is smaller than the growth of ideas
galnagli
Happy to answer questions : )
waldopat
I've got a question! I'd say what's happening with viebcoding is really an acceleration of move fast and break things. Uber and Snapchat both had major security vulnerabilities, resulting in millions of user records leaked, in their hey day of the mid 2010s. And that was WITH whatever DevOps pipeline, code review or other best practices likely in place.
What's unique about Tea or Base44 (or Replit founder deleting his codebase) is A) the disregard for security best practices and B) the speed at which they both grew and exposed vulnerabilities.
So my question is, how do you see the balance of cybersecurity and AI as everything moves faster than ever before?
waldopat
^^^ Hey YC Fam, this is the author
darepublic
These platforms feel like their authors just stick a big bow (uniquely branded ofc) on top of llms. I don't want to undervalue the importance of good glue code.. but that's all I see here. Doesn't deserve the glossy sheen or accolades imo.
bgwalter
Fun facts: All of Wix, Wiz, base44 were founded by ex Unit 8200 members. Wix was used by the NSO group to create fake websites for targeting critics:
sschueller
I wonder how many of their executives can be directly linked to war crimes and/or crimes against humanity.
jus3sixty
Every single day someone dies a wrongful death, a plane crashes, a serious data breach occurs, and someone slips on a banana peel.
None of these things will ever stop the billionaire gravy train because of something called “Risk Management.” I don’t think our “vibe-coded AI slopware” is an exception.
bitwize
Remember, the S in GenAI is for security.
swyx
soo Wiz found a vuln in Wix?
this is israeli on israeli violence
uponasmile
>he vulnerability was fixed in less than 24 hours
I wonder if they fixed it manually or used Base44 to fix it
"The vulnerability we discovered was remarkably simple to exploit - by providing only a non-secret app_id value to undocumented registration and email verification endpoints." So you could sign yourself up as editor / collaborator on any app once you knew the app's ID.
Jeez, that's sloppy. My colleague in 2000 discovered you could browse any account on his bank's website by just changing the (sequential!) account IDs in the URL. In a lot of ways we've made great strides in security over the last 25 years... and in many ways, we haven't.