Home > Blogs > Companies House Security Flaw

Companies House Security Flaw Exposes Millions, A Wake Up Call for Government Digital Infrastructure

8 min read Published on 18th March 2026

A critical vulnerability in Companies House has exposed serious weaknesses in public sector cybersecurity infrastructure. First reported by BBC News, the flaw allowed unauthorized users to access private company dashboards, raising concerns over data exposure, fraud risks, and systemic security gaps.

For cybersecurity professionals and organizations alike, this incident is more than just a technical glitch; it's a case study in access control failure and risk management.

Technical Overview of the Vulnerability

The issue originated within the Companies House WebFiling system, where improper session handling and access control logic reportedly allowed users to access unauthorized accounts.

Key technical concerns:

  • Broken Access Control (BAC): Users could access other company dashboards without proper authorization
  • Session Mismanagement: Navigation actions (such as browser back function) bypassed authentication checks
  • Lack of Validation Layers: Insufficient verification of user session ownership

This aligns with one of the most critical risks highlighted in the OWASP Top 10: Broken Access Control.

Potential Data Exposure

The vulnerability may have exposed highly sensitive corporate and personal data, including:

  • Director names and residential addresses
  • Dates of birth
  • Registered email addresses
  • Filing and company structure details

Such information is highly valuable for threat actors engaging in:

  • Identity theft
  • Business impersonation
  • Social engineering and phishing campaigns

Threat Landscape and Exploitation Risks

1. Corporate Identity Fraud

Attackers could impersonate company directors and manipulate official records.

2. Unauthorized Filings

Malicious actors may submit fraudulent updates, impacting legal and financial standing.

3. Targeted Phishing Campaigns

Access to verified company data significantly increases phishing success rates.

4. Supply Chain Risks

Compromised company data can be leveraged to attack partners, vendors, and clients.

Incident Response and Mitigation

Following the discovery, Companies House took immediate action:

  • Temporarily suspended the WebFiling service
  • Initiated internal security investigations
  • Reported the incident to regulatory authorities
  • Implemented remediation measures to close the vulnerability

However, the lack of clarity around exploitation leaves residual risk.

Cybersecurity Lessons for Organizations

This incident reinforces several critical security principles:

Strengthen Access Control Mechanisms

Ensure strict authentication and authorization checks at every layer.

Conduct Regular Security Audits

Proactive vulnerability assessments can prevent such exposures.

Implement Penetration Testing

Simulating real-world attacks helps identify logic flaws often missed in development.

Monitor and Log User Activity

Robust logging can help detect suspicious behavior early.

Adopt Zero Trust Architecture

Never assume trust; verify every access request continuously.

What Businesses Should Do Now

Organizations listed on Companies House should take immediate precautions:

  • Audit company records for unauthorized changes
  • Monitor director and company data exposure
  • Educate stakeholders about phishing risks
  • Strengthen internal cybersecurity posture

Why This Matters for Cybersecurity

The Companies House incident highlights a broader issue: critical national infrastructure systems are increasingly becoming targets or weak points in the cyber threat landscape.

Even without a traditional “hack,” logic flaws can lead to equally damaging outcomes.

For cybersecurity professionals, this serves as a reminder that security is not just about preventing breaches, it is about preventing misuse of legitimate access.

Conclusion

The Companies House vulnerability is a stark reminder that even trusted government platforms are not immune to security flaws. As digital ecosystems expand, ensuring robust access control, continuous monitoring, and proactive defense strategies is no longer optional, it is essential.


Public Sector Security Access Control