Introduction: Notion Email Leak Exposes Editors of Public Pages
Notion, a widely used productivity and collaboration platform, is facing scrutiny after a serious privacy vulnerability was revealed. The issue centers on the exposure of email addresses belonging to all editors of any public Notion page. This means that anyone with access to a public page can view the email addresses of its contributors, even if those emails are not meant to be publicly visible. The discovery was shared on social media and quickly gained traction in tech communities, sparking concerns about user privacy and the security of collaborative workspaces [Source: Source]. Given Notion’s popularity among individuals, businesses, and educational institutions, the leak has significant implications for millions of users who rely on the platform to manage sensitive information and projects.
Details of the Email Leak Vulnerability
The vulnerability appears to stem from how Notion structures public pages. When a Notion page is set to "public," it is accessible via a shareable link, intended for wide distribution or open access. However, researchers and users have discovered that by inspecting certain elements—such as the page’s metadata or embedded scripts—they can extract the email addresses of all editors associated with the document, regardless of whether these details are displayed in the page content itself [Source: Source].
For example, security researcher @weezerOSINT demonstrated that simply opening the developer tools in a web browser and examining network requests or source code reveals a list containing the email addresses of every editor. This exposure is not limited to page owners; it includes anyone with edit permissions, potentially revealing personal or business emails to any visitor of a public page.
The scale of the issue is difficult to quantify, but considering Notion’s user base and the prevalence of publicly shared pages for documentation, knowledge bases, and collaborative projects, the number of affected users could be substantial. Many organizations use Notion for internal documentation, onboarding, and even customer-facing resources. If these pages are public, every editor—regardless of their intentions regarding privacy—faces the risk of their email address being exposed to the internet at large.
User and Community Reactions
The revelation has prompted swift reactions from Notion users and the broader tech community. On Twitter, users expressed alarm over the ease with which sensitive information could be accessed, highlighting risks such as targeted phishing, spam, and unwanted contact. The vulnerability was also discussed extensively on Hacker News, where the original thread garnered 171 points and over 50 comments [Source: Source]. Community members voiced concerns about Notion’s approach to privacy, with some questioning whether similar issues exist on other SaaS platforms.
Several users called for immediate action from Notion, urging the company to patch the leak and improve its privacy controls. Others shared personal anecdotes about using Notion for confidential work, now worried that their email addresses might be exposed. The sentiment on forums and social media reflects a blend of frustration, concern, and calls for greater transparency from Notion regarding its security practices.
Notion’s Response and Mitigation Measures
As of the time of writing, Notion has not issued an official public statement addressing the email leak. Users are left waiting for confirmation that the issue is being investigated and resolved. Most affected users are seeking guidance on how to protect themselves, with some opting to temporarily remove public access from their pages or limit sharing to trusted collaborators only.
Security experts recommend that users review their public pages and adjust privacy settings to minimize exposure. The incident has parallels with prior SaaS security lapses, where metadata or backend information inadvertently revealed user data. Without a prompt response from Notion, users are questioning the platform's reliability for sensitive collaboration. The company is under increasing pressure to provide clear instructions and implement technical fixes to prevent further leaks.
Implications for User Privacy and Best Practices
The Notion email leak underscores broader challenges facing SaaS platforms. As collaborative tools become more deeply integrated into organizational workflows, the stakes for user privacy continue to rise. Exposing editor email addresses may seem minor, but it opens the door to targeted attacks, social engineering, and erosion of trust between platform providers and their users.
This incident highlights the importance of regularly reviewing privacy settings and understanding the implications of making content public. Users managing sensitive or confidential information should ensure that pages are shared only with intended recipients, and that metadata does not contain private details. Organizations are advised to train employees on digital hygiene and vet the platforms they use for collaboration.
Ultimately, the leak illustrates the need for SaaS providers like Notion to adopt stronger security protocols—such as redacting sensitive metadata from public pages and offering granular privacy controls. Transparency and responsiveness in handling vulnerabilities are crucial for maintaining user trust.
Conclusion: What This Means for Notion Users Going Forward
The exposure of editor email addresses on public Notion pages serves as a stark reminder of the privacy risks inherent in digital collaboration tools. Notion users should remain vigilant, regularly audit their shared content, and stay informed about platform updates and security advisories. While the company is expected to address the vulnerability, this event may prompt broader changes in how SaaS platforms design and manage privacy features.
As collaboration continues to move online, striking a balance between openness and security becomes ever more important. Users and providers alike must prioritize privacy, ensuring that the benefits of digital productivity do not come at the expense of personal or organizational safety.



