I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites

I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites

Exposed Algolia Admin Keys Found in 39 Major Open Source Docs Sites: “Anyone Could Delete Entire Search Indexes”

In a shocking security discovery, a developer has uncovered 39 exposed Algolia admin API keys embedded in documentation sites for some of the largest open source projects on the web, potentially allowing attackers to completely destroy search functionality or manipulate search results across thousands of sites.

The issue was first spotted when a developer reported an exposed admin key on vuejs.org last October. After the Vue.js team acknowledged the problem and rotated the key, the researcher wondered: if Vue.js had this issue, how many other DocSearch sites might be vulnerable?

The answer: at least 39 major projects, with the actual number likely much higher.

How It Works

Algolia’s DocSearch provides free search services for open source documentation. The service crawls websites, indexes content, and provides API keys that should be search-only. However, many sites accidentally embed admin keys in their frontend configurations instead.

What Was Found

The researcher discovered these keys through multiple methods:

  • Frontend scraping of roughly 15,000 documentation sites
  • GitHub code search for keys in documentation framework configs
  • TruffleHog analysis of 500+ documentation site repositories

35 of the 39 admin keys came from frontend scraping alone. All keys were active when discovered.

Major Projects Affected

The exposed keys belong to some of the biggest names in open source:

Home Assistant – 85,000+ GitHub stars, millions of active installations
KEDA – CNCF project used in production Kubernetes clusters
vcluster – Kubernetes infrastructure with the largest affected index (100,000+ records)
Vue.js – Already addressed, but was the initial discovery
SUSE/Rancher – Acknowledged and rotated their key within two days

What These Keys Can Do

Nearly all exposed keys have identical dangerous permissions:

  • Add, modify, or delete any record in the search index
  • Delete entire indexes
  • Change index settings and ranking configuration
  • Browse and export all indexed content

In practical terms, anyone with these keys could:

  • Poison search results with malicious links
  • Redirect users to phishing pages
  • Completely wipe out search functionality for entire sites
  • Export sensitive documentation content

The Response

SUSE/Rancher responded within two days and rotated their key (now fully revoked).
Home Assistant acknowledged the issue but the original key remains active.
Algolia was directly emailed with the full list of affected keys weeks ago but has not responded. As of today, all remaining keys are still active.

The Root Cause

This isn’t about 39 individual mistakes. Algolia’s DocSearch program provides search-only keys, but many sites run their own crawlers and accidentally use write or admin keys in frontend configurations. Algolia’s own documentation warns against this, but it clearly happens at scale.

The Fix

If you’re running DocSearch, check what key is in your frontend configuration and ensure it’s search-only. The researcher notes: “If I found 39 admin keys with a few scripts, the real number is almost certainly higher.”

This is a critical security issue affecting major open source projects that Algolia and the affected projects need to address immediately.

tags: #Algolia #Security #APIKeys #OpenSource #Documentation #Vuejs #HomeAssistant #Kubernetes #SUSE #Rancher #vcluster #KEDA #Cybersecurity #DataBreach #ExposedCredentials

viral: “Exposed admin keys could let anyone delete entire search indexes” | “35 keys found through frontend scraping alone” | “Home Assistant has millions of installations at risk” | “Algolia hasn’t responded to security disclosure” | “Keys still active despite being reported weeks ago” | “The real number is almost certainly higher” | “Anyone could poison search results with malicious links” | “This affects some of the biggest names in open source” | “Major Kubernetes projects exposed” | “Security Hall of Fame member discovered widespread vulnerability”

,

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *