
Public Notion Pages Leaks Profile Photos and Email address of Editors
For organizations relying on Notion for collaboration, a recent revelation has exposed a critical privacy oversight that demands immediate attention. Security researchers have discovered that publicly accessible Notion pages are inadvertently leaking the personally identifiable information (PII) of anyone who has contributed to them. This data exposure, which includes full names, email addresses, and even profile photos, presents a significant risk to user privacy and organizational security. Understanding the scope of this issue and implementing effective countermeasures is paramount for safeguarding sensitive data.
The Notion Data Leak Explained
The core of this Notion data leak stems from how public pages are configured and how editor information is handled internally. When a Notion page is made public, it is designed for broad accessibility. However, this accessibility extends beyond just the content, silently exposing details of past and present editors. This isn’t a vulnerability in the traditional sense of a system exploit, but rather a misconfigured default or an overlooked consequence of public access settings.
Specifically, the data exposed includes:
- Full Names: The complete names of individuals who have edited the public page.
- Email Addresses: The primary email addresses associated with the editors’ Notion accounts.
- Profile Photos: Any profile pictures uploaded by the editors.
This exposure is particularly concerning because many organizations use Notion for both internal and external communication, including project management, knowledge bases, and even public-facing documentation. The silent nature of the leak means that many users and administrators may be unaware that their PII is readily discoverable by anyone with the public page link.
Understanding the Privacy Implications for Notion Users
The implications of this PII exposure are far-reaching. For individuals, it can lead to an increased risk of targeted phishing attacks, spam, and identity theft. Malicious actors can harvest this information to craft highly convincing social engineering campaigns, leveraging the publicly available names and email addresses to appear legitimate. Furthermore, the exposure of profile photos could be used for reconnaissance in more sophisticated attacks.
For organizations, the risks are compounded. A data leak, even of “editor” information, can erode trust with employees, partners, and customers. It can also lead to compliance issues, particularly for organizations operating under stringent data protection regulations like GDPR or CCPA. Publicly available PII associated with an organization can also provide valuable intelligence to competitors or adversaries looking to gain an unfair advantage.
Remediation Actions and Best Practices for Notion Users
Addressing this Notion data exposure requires a multi-faceted approach, focusing on awareness, configuration review, and proactive measures. While Notion itself may implement platform-wide changes, users and administrators have immediate steps they can take.
- Audit Public Pages: Immediately review all Notion pages that are currently set to “Public Access.” Identify any pages that contain sensitive information or that should not be broadly accessible.
- Restrict Access: For pages that do not absolutely need to be public, change their sharing settings to “Team Access,” “Private,” or “Shared with specific people.” This will significantly reduce the surface area for PII exposure.
- Educate Users: Inform all Notion users within your organization about this issue. Emphasize the importance of judiciously setting page permissions and the potential risks of public page editors.
- Regularly Review Permissions: Implement a regular schedule for reviewing Notion page permissions, especially for high-value intellectual property or sensitive projects.
- Consider Alternative Public Sharing Methods: If publishing content publicly is essential, evaluate if Notion is the ideal platform for that specific content, or if other platforms designed with greater anonymity or content-only sharing features are more suitable.
- Anonymize Editors (If Possible): While not directly supported by Notion for editor details, organizations might consider using generic or pseudonymized accounts for public-facing content creation if individual PII absolutely cannot be exposed. However, this is a workaround and not a direct solution to the underlying issue.
- Monitor for CVEs: While this particular issue may not be assigned a traditional CVE due to its nature as a configuration oversight rather than a software vulnerability, organizations should still monitor the CVE database for any related or emergent issues impacting Notion or similar collaboration platforms.
Tools for Data Leak Detection and Monitoring
While the Notion issue requires manual checks, employing broader data leak detection and monitoring tools can bolster an organization’s overall security posture. These tools can help identify if leaked PII from Notion, or any other source, ends up on the dark web or in other compromised data sets.
| Tool Name | Purpose | Link |
|---|---|---|
| Have I Been Pwned? | Checks if email addresses or phone numbers have appeared in data breaches. | https://haveibeenpwned.com/ |
| Dark Web Monitoring Services | Monitors for organizational data (e.g., employee credentials, PII) on dark web forums and marketplaces. | (Varies – examples include services from reputable cybersecurity vendors) |
| Data Loss Prevention (DLP) Solutions | Prevents sensitive data from leaving an organization’s network and monitors for data exfiltration attempts. | (Varies – examples include Symantec DLP, Microsoft Purview DLP) |
Conclusion: Prioritizing Privacy in Collaboration Platforms
The exposure of editor PII on public Notion pages serves as a stark reminder of the continuous need for vigilance in managing digital collaboration platforms. While Notion is an incredibly powerful tool, its default settings and the nuances of public sharing require careful consideration from a security and privacy perspective. Organizations and individual users must take proactive steps to audit their public pages, restrict unnecessary access, and educate themselves on the implications of data sharing. In the landscape of modern digital work, understanding and controlling data flow is not just an IT task, but a fundamental aspect of maintaining trust and security.


