A user was able to access another users source code, database credentials, AI chat histories, and customer data are all readable by any free account.

They accessed another user's profile, listed their public projects, and downloaded the source code of an admin panel for Connected Women in AI, a real danish nonprofit. the project was last edited 10 days ago. the developer has 3,703 edits this year. this is not abandoned. this is active.
They extracted the database credentials from the source code and queried it. got back real names, real companies, real linkedin profiles. speakers from Accenture Denmark and Copenhagen Business School. not test data. not "John Doe". real people at real companies who have no idea their information is exposed.
Lovable patched this for new projects. they never patched it for existing ones.
A project created in April 2026 returns 403 forbidden. The same developer's older project, actively edited 10 days ago, returns 200 OK with the full source tree. same API. Same endpoint. same free account. same session. one is protected. the other is wide open.
The first hackerone report was filed March 3, 2026. Lovable marked it triaged, then they shipped ownership checks for new projects and left every existing project exposed. 48 days later nothing has changed. He also claims that every conversation you have with lovable's AI is stored and readable through the same bug.
Source: weezerOSINT




