Misconfigurations in Microsoft Power Pages could expose millions of sensitive records
The issue has already meant the personal information of over 1.1 million NHS workers was exposed to the public internet
 
 
A data exposure issue stemming from misconfigured access controls in Microsoft Power Pages has left several millions of records exposed to unauthorized users, new research reveals.
Aaron Costello, chief of SaaS security and research at AppOmni, detailed how Microsoft’s website building platform could be granting anonymous users permissions to access sensitive PII.
In September 2024, Costello said he uncovered “significant amounts of data being exposed to the public internet as a result of misconfigured access controls in Microsoft Power Page websites.”
Microsoft Power Pages is a low-code SaaS platform used by over 250 million people a month to build websites, according to AppOmni, which lets users build externally facing websites on Microsoft’s infrastructure.
“The main benefits of Power Pages over traditional custom web development include out-of-the-box (OOB) role based access control (RBAC), the automatic ability to use Microsoft’s Dataverse as a database, and a drag-and-drop interface using pre-built components which greatly reduces the need for custom code.”
Costello warned, however, that the easy deployments enabled by Power Pages could come at the expense of security if the platform is not managed correctly, stating that he has discovered several million records of sensitive data exposed to the public internet during his testing.
Costello noted one case where a large shared business service provider for the NHS was found to have leaked information of over 1.1 million NHS employees.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The leaked information contained email addresses, telephone numbers, as well as home addresses of the employees, with the report noting this specific incident has been resolved since its discovery.
Admins should be wary of using ‘anonymous role’ in table permissions
Costello said these data exposures are possible due to a misunderstanding of access controls within Power Pages, as well as insecure custom code implementations.
“By granting unauthenticated users excessive permissions, anyone may have the ability to extract records from the database using readily-available Power Page APIs,” he explained.
The report identified four causes for the exposures, the first being the fact that Power Page exposes excessive columns to the Web API, which Costello noted is not necessarily an issue, but could amplify the degree of information exposed if unauthorized access occurs.
A Power Pages site has self-registration and login enabled by default, which means that although the page may not be visible on the platform, users may still be able to register and authenticate through the associated APIs.
RELATED WEBINAR
  
External users can also be granted global access for read operations, providing them with unrestricted read access to all rows of data regardless of record ownership.
Costello warned that if your organization has enabled both external registration and external login, they need to include the ‘authenticated users’ role in their definition of 'external users’.
This issue is also caused by users not enabling column security for sensitive columns, which means that all columns that are web API enabled will be shown to external users if permissions at the table level are misconfigured.
Finally, Costello said that throughout his testing he did not observe the use of obfuscation for sensitive columns.
“If an organization does not wish to leverage column security profiles, it may be wise to apply masks to PII related columns exclusively for external users, without hindering site functionality.”
He noted that Microsoft has included a number of warnings in the backend of the Power Pages and Power Platform applications when it detects a configuration that could leave the organization vulnerable.
This included a banner on all Power Platform admin console pages, which warns that if a page is public, any changes would be immediately visible, as well as an informational message within Power Page’s table permissions configuration page, warning admins about the risks of using the ‘anonymous role’ in table permissions.
A Microsoft spokesperson told ITPro the firm was aware of Costello's report and gave the following statement.
"We provide strict data access by default, and there are security and governance controls for IT administrators to customize to their organization’s needs. Additionally, there are notifications to alert makers about potentially risky data permissions when new tables are enabled on websites, and IT admins can monitor activity through the Power Platform Admin Center."

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
- 
 Enterprises can’t keep a lid on surging cyber incident costs Enterprises can’t keep a lid on surging cyber incident costsNews With increasing threats and continuing skills shortages, AI tools are becoming a necessity for some 
- 
 UK software developers are still cautious about AI, and for good reason UK software developers are still cautious about AI, and for good reasonNews Experts say developers are “right to take their time” with AI coding solutions given they still remain a nascent tool 
- 
 CISA issues alert after botched Windows Server patch exposes critical flaw CISA issues alert after botched Windows Server patch exposes critical flawNews A critical remote code execution flaw in Windows Server is being exploited in the wild, despite a previous 'fix' 
- 
 Microsoft issues warning over “opportunistic” cyber criminals targeting big business Microsoft issues warning over “opportunistic” cyber criminals targeting big businessNews Microsoft has called on governments to do more to support organizations 
- 
 A terrifying Microsoft flaw could’ve allowed hackers to compromise ‘every Entra ID tenant in the world’ A terrifying Microsoft flaw could’ve allowed hackers to compromise ‘every Entra ID tenant in the world’News The Entra ID vulnerability could have allowed full access to virtually all Azure customer accounts 
- 
 Microsoft and Cloudflare just took down a major phishing operation Microsoft and Cloudflare just took down a major phishing operationNews RaccoonO365’s phishing as a service platform has risen to prominence via Telegram 
- 
 Microsoft quietly launched an AI agent that can detect and reverse engineer malware Microsoft quietly launched an AI agent that can detect and reverse engineer malwareNews Researchers say the tool is already achieving the “gold standard” in malware classification 
- 
 Microsoft patched a critical vulnerability in its NLWeb AI search tool – but there's no CVE (yet) Microsoft patched a critical vulnerability in its NLWeb AI search tool – but there's no CVE (yet)News Researchers found an unauthenticated path traversal bug in the tool debuted at Microsoft Build in May 
- 
 NCSC says ‘limited number’ of UK firms affected by SharePoint attack as global impact spreads NCSC says ‘limited number’ of UK firms affected by SharePoint attack as global impact spreadsNews The SharePoint flaw has already had a wide impact according to reports from government security agencies 
- 
 Confused at all the threat group names? You’re not alone. CrowdStrike and Microsoft want to change that Confused at all the threat group names? You’re not alone. CrowdStrike and Microsoft want to change thatNews CrowdStrike and Microsoft hope to "bring clarity and coordination" to the cyber industry by unifying threat group naming conventions.