This vulnerability occurs when a system indexes sensitive documents for search but fails to properly restrict who can query that index. Attackers can then discover and extract confidential information from the indexed content without having direct access to the original files.
Many applications build search indexes to help users quickly find documents. However, if the index itself isn't protected with the same authorization checks as the original documents, it becomes a backdoor. An unauthorized user can perform targeted searches and view snippets or metadata from private files, effectively bypassing the intended security controls. The risk is highest when search results include surrounding context or text fragments beyond the exact search term. This can happen when search engines are misconfigured to index directories or files that should be excluded. Even without permission to download a full document, an attacker can piece together sensitive information through repeated, clever queries against the exposed index.
Impact: Read Application Data