Practical guide for hunters: how leaked webhooks are abused and how to defend them
I wrote a hands on guide that shows how leaked webhooks surface as an attack vector; how to find them in the wild; how to craft safe non destructive PoCs; how to harden receivers. Includes curl examples for Slack and Discord; Node.js and Go HMAC verification samples; a disclosure template. Why this matters * webhooks are often treated as bearer secrets; leaks are common * small mistakes in verification or ordering can become business logic bugs * many real world impacts are serviceable without flashy RCE What you get in the post * threat model and scope guidance * detection rules and SIEM ideas Read it here: [https://blog.himanshuanand.com/posts/2025-09-17-how-to-hack-webhooks/](https://blog.himanshuanand.com/posts/2025-09-17-how-to-hack-webhooks/) Notes: do not test endpoints you do not own. follow program scope and responsible disclosure rules. Happy hunting
AI Analysis
Technical Summary
This security threat centers around the abuse of leaked webhooks, which are commonly used to enable communication between services by sending real-time data to specified URLs. Webhooks often function as bearer tokens, meaning possession of the webhook URL alone can grant an attacker the ability to send arbitrary data to the receiving service. The guide referenced provides a practical approach to identifying leaked webhooks in the wild, crafting safe proof-of-concept (PoC) exploits that avoid destructive outcomes, and hardening webhook receivers against abuse. Key technical points include the common failure to properly verify webhook payloads, such as neglecting to validate HMAC signatures or mishandling the order of verification steps, which can lead to business logic vulnerabilities even without direct remote code execution (RCE). The guide includes examples using curl for Slack and Discord webhooks and sample code in Node.js and Go for HMAC verification, illustrating how attackers might exploit these weaknesses. It also offers detection strategies, including SIEM rules to identify suspicious webhook activity. Although no known exploits are currently active in the wild, the threat is significant because leaked webhooks are a frequent occurrence and can be leveraged for unauthorized actions, data manipulation, or service disruption. The threat model emphasizes that even small mistakes in webhook security can have outsized impacts, and the guide advocates responsible disclosure and ethical testing practices.
Potential Impact
For European organizations, the abuse of leaked webhooks can lead to unauthorized data injection, manipulation of business processes, and potential service disruptions. Since webhooks are widely used in collaboration platforms (e.g., Slack, Discord) and internal automation pipelines, exploitation could compromise confidentiality by exposing sensitive data sent via webhook payloads, integrity by altering data or triggering unintended workflows, and availability by overwhelming services or triggering destructive actions. The absence of flashy RCE does not diminish the threat, as business logic flaws can cause significant operational and reputational damage. Organizations relying heavily on SaaS integrations and automated workflows are particularly at risk. Furthermore, compliance with GDPR and other data protection regulations means that unauthorized data access or manipulation via webhook abuse could lead to regulatory penalties. The threat is exacerbated by the common practice of treating webhook URLs as bearer tokens without additional authentication or verification, increasing the attack surface. Detection and response can be challenging due to the subtlety of such attacks and the difficulty in distinguishing legitimate from malicious webhook traffic without proper logging and monitoring.
Mitigation Recommendations
European organizations should implement multi-layered defenses for webhook security beyond simply keeping URLs secret. Specific recommendations include: 1) Enforce strict HMAC signature verification on all incoming webhook requests using a shared secret, ensuring the payload integrity and authenticity; 2) Implement nonce or timestamp checks to prevent replay attacks; 3) Use allowlists for source IP addresses where feasible to restrict webhook senders; 4) Design webhook receivers to validate payload content rigorously and implement business logic checks to prevent unauthorized actions; 5) Rotate webhook URLs and secrets periodically and immediately upon suspicion of leakage; 6) Employ monitoring and alerting via SIEM tools to detect anomalous webhook activity, such as unexpected payloads or traffic spikes; 7) Educate development and operations teams about the risks of webhook leakage and secure coding practices; 8) Avoid embedding sensitive data in webhook URLs or payloads; 9) Use separate webhook endpoints with minimal privileges for different integration purposes to limit blast radius; 10) Conduct regular security reviews and penetration testing focused on webhook implementations. These measures collectively reduce the risk of abuse and improve detection capabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
Practical guide for hunters: how leaked webhooks are abused and how to defend them
Description
I wrote a hands on guide that shows how leaked webhooks surface as an attack vector; how to find them in the wild; how to craft safe non destructive PoCs; how to harden receivers. Includes curl examples for Slack and Discord; Node.js and Go HMAC verification samples; a disclosure template. Why this matters * webhooks are often treated as bearer secrets; leaks are common * small mistakes in verification or ordering can become business logic bugs * many real world impacts are serviceable without flashy RCE What you get in the post * threat model and scope guidance * detection rules and SIEM ideas Read it here: [https://blog.himanshuanand.com/posts/2025-09-17-how-to-hack-webhooks/](https://blog.himanshuanand.com/posts/2025-09-17-how-to-hack-webhooks/) Notes: do not test endpoints you do not own. follow program scope and responsible disclosure rules. Happy hunting
AI-Powered Analysis
Technical Analysis
This security threat centers around the abuse of leaked webhooks, which are commonly used to enable communication between services by sending real-time data to specified URLs. Webhooks often function as bearer tokens, meaning possession of the webhook URL alone can grant an attacker the ability to send arbitrary data to the receiving service. The guide referenced provides a practical approach to identifying leaked webhooks in the wild, crafting safe proof-of-concept (PoC) exploits that avoid destructive outcomes, and hardening webhook receivers against abuse. Key technical points include the common failure to properly verify webhook payloads, such as neglecting to validate HMAC signatures or mishandling the order of verification steps, which can lead to business logic vulnerabilities even without direct remote code execution (RCE). The guide includes examples using curl for Slack and Discord webhooks and sample code in Node.js and Go for HMAC verification, illustrating how attackers might exploit these weaknesses. It also offers detection strategies, including SIEM rules to identify suspicious webhook activity. Although no known exploits are currently active in the wild, the threat is significant because leaked webhooks are a frequent occurrence and can be leveraged for unauthorized actions, data manipulation, or service disruption. The threat model emphasizes that even small mistakes in webhook security can have outsized impacts, and the guide advocates responsible disclosure and ethical testing practices.
Potential Impact
For European organizations, the abuse of leaked webhooks can lead to unauthorized data injection, manipulation of business processes, and potential service disruptions. Since webhooks are widely used in collaboration platforms (e.g., Slack, Discord) and internal automation pipelines, exploitation could compromise confidentiality by exposing sensitive data sent via webhook payloads, integrity by altering data or triggering unintended workflows, and availability by overwhelming services or triggering destructive actions. The absence of flashy RCE does not diminish the threat, as business logic flaws can cause significant operational and reputational damage. Organizations relying heavily on SaaS integrations and automated workflows are particularly at risk. Furthermore, compliance with GDPR and other data protection regulations means that unauthorized data access or manipulation via webhook abuse could lead to regulatory penalties. The threat is exacerbated by the common practice of treating webhook URLs as bearer tokens without additional authentication or verification, increasing the attack surface. Detection and response can be challenging due to the subtlety of such attacks and the difficulty in distinguishing legitimate from malicious webhook traffic without proper logging and monitoring.
Mitigation Recommendations
European organizations should implement multi-layered defenses for webhook security beyond simply keeping URLs secret. Specific recommendations include: 1) Enforce strict HMAC signature verification on all incoming webhook requests using a shared secret, ensuring the payload integrity and authenticity; 2) Implement nonce or timestamp checks to prevent replay attacks; 3) Use allowlists for source IP addresses where feasible to restrict webhook senders; 4) Design webhook receivers to validate payload content rigorously and implement business logic checks to prevent unauthorized actions; 5) Rotate webhook URLs and secrets periodically and immediately upon suspicion of leakage; 6) Employ monitoring and alerting via SIEM tools to detect anomalous webhook activity, such as unexpected payloads or traffic spikes; 7) Educate development and operations teams about the risks of webhook leakage and secure coding practices; 8) Avoid embedding sensitive data in webhook URLs or payloads; 9) Use separate webhook endpoints with minimal privileges for different integration purposes to limit blast radius; 10) Conduct regular security reviews and penetration testing focused on webhook implementations. These measures collectively reduce the risk of abuse and improve detection capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Source Type
- Subreddit
- netsec
- Reddit Score
- 1
- Discussion Level
- minimal
- Content Source
- reddit_link_post
- Domain
- blog.himanshuanand.com
- Newsworthiness Assessment
- {"score":21.1,"reasons":["external_link","newsworthy_keywords:rce,leaked,ttps","non_newsworthy_keywords:how to,guide,rules","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["rce","leaked","ttps"],"foundNonNewsworthy":["how to","guide","rules"]}
- Has External Source
- true
- Trusted Domain
- false
Threat ID: 68caab79940d5859b9d108f8
Added to database: 9/17/2025, 12:37:13 PM
Last enriched: 9/17/2025, 12:37:26 PM
Last updated: 9/17/2025, 11:05:03 PM
Views: 8
Related Threats
CVE-2025-10631: Cross Site Scripting in itsourcecode Online Petshop Management System
MediumCVE-2025-10629: Command Injection in D-Link DIR-852
MediumCVE-2025-10628: Command Injection in D-Link DIR-852
MediumCVE-2025-35430: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CISA Thorium
MediumCVE-2025-58432: CWE-250: Execution with Unnecessary Privileges in IceWhaleTech ZimaOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.