Misconfigurations in Microsoft Power Pages could expose millions of sensitive records
The issue has already meant the personal information of over 1.1 million NHS workers was exposed to the public internet
A data exposure issue stemming from misconfigured access controls in Microsoft Power Pages has left several millions of records exposed to unauthorized users, new research reveals.
Aaron Costello, chief of SaaS security and research at AppOmni, detailed how Microsoft’s website building platform could be granting anonymous users permissions to access sensitive PII.
In September 2024, Costello said he uncovered “significant amounts of data being exposed to the public internet as a result of misconfigured access controls in Microsoft Power Page websites.”
Microsoft Power Pages is a low-code SaaS platform used by over 250 million people a month to build websites, according to AppOmni, which lets users build externally facing websites on Microsoft’s infrastructure.
“The main benefits of Power Pages over traditional custom web development include out-of-the-box (OOB) role based access control (RBAC), the automatic ability to use Microsoft’s Dataverse as a database, and a drag-and-drop interface using pre-built components which greatly reduces the need for custom code.”
Costello warned, however, that the easy deployments enabled by Power Pages could come at the expense of security if the platform is not managed correctly, stating that he has discovered several million records of sensitive data exposed to the public internet during his testing.
Costello noted one case where a large shared business service provider for the NHS was found to have leaked information of over 1.1 million NHS employees.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The leaked information contained email addresses, telephone numbers, as well as home addresses of the employees, with the report noting this specific incident has been resolved since its discovery.
Admins should be wary of using ‘anonymous role’ in table permissions
Costello said these data exposures are possible due to a misunderstanding of access controls within Power Pages, as well as insecure custom code implementations.
“By granting unauthenticated users excessive permissions, anyone may have the ability to extract records from the database using readily-available Power Page APIs,” he explained.
The report identified four causes for the exposures, the first being the fact that Power Page exposes excessive columns to the Web API, which Costello noted is not necessarily an issue, but could amplify the degree of information exposed if unauthorized access occurs.
A Power Pages site has self-registration and login enabled by default, which means that although the page may not be visible on the platform, users may still be able to register and authenticate through the associated APIs.
RELATED WEBINAR
External users can also be granted global access for read operations, providing them with unrestricted read access to all rows of data regardless of record ownership.
Costello warned that if your organization has enabled both external registration and external login, they need to include the ‘authenticated users’ role in their definition of 'external users’.
This issue is also caused by users not enabling column security for sensitive columns, which means that all columns that are web API enabled will be shown to external users if permissions at the table level are misconfigured.
Finally, Costello said that throughout his testing he did not observe the use of obfuscation for sensitive columns.
“If an organization does not wish to leverage column security profiles, it may be wise to apply masks to PII related columns exclusively for external users, without hindering site functionality.”
He noted that Microsoft has included a number of warnings in the backend of the Power Pages and Power Platform applications when it detects a configuration that could leave the organization vulnerable.
This included a banner on all Power Platform admin console pages, which warns that if a page is public, any changes would be immediately visible, as well as an informational message within Power Page’s table permissions configuration page, warning admins about the risks of using the ‘anonymous role’ in table permissions.
A Microsoft spokesperson told ITPro the firm was aware of Costello's report and gave the following statement.
"We provide strict data access by default, and there are security and governance controls for IT administrators to customize to their organization’s needs. Additionally, there are notifications to alert makers about potentially risky data permissions when new tables are enabled on websites, and IT admins can monitor activity through the Power Platform Admin Center."

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Hackers are using LLMs to generate malicious JavaScript in real timeNews Defenders advised to use runtime behavioral analysis to detect and block malicious activity at the point of execution, directly within the browser
-
Developers in India are "catching up fast" on AI-generated codingNews Developers in the United States are leading the world in AI coding practices, at least for now
-
Thousands of Microsoft Teams users are being targeted in a new phishing campaignNews Microsoft Teams users should be on the alert, according to researchers at Check Point
-
Microsoft warns of rising AitM phishing attacks on energy sectorNews The campaign abused SharePoint file sharing services to deliver phishing payloads and altered inbox rules to maintain persistence
-
Microsoft just took down notorious cyber crime marketplace RedVDS – and found hackers were using ChatGPT and its own Copilot tool to wage attacksNews Microsoft worked closely with law enforcement to take down the notorious RedVDS cyber crime service – and found tools like ChatGPT and its own Copilot were being used by hackers.
-
These Microsoft Teams security features will be turned on by default this month – here's what admins need to knowNews From 12 January, weaponizable file type protection, malicious URL detection, and a system for reporting false positives will all be automatically activated.
-
The Microsoft bug bounty program just got a big update — and even applies to third-party codeNews Microsoft is expanding its bug bounty program to cover all of its products, even those that haven't previously been covered by a bounty before and even third-party code.
-
Microsoft Teams is getting a new location tracking feature that lets bosses snoop on staff – research shows it could cause workforce pushbackNews A new location tracking feature in Microsoft Teams will make it easier to keep tabs on your colleague's activities – and for your boss to know exactly where you are.
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities