News: 1773663503

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Flaw in UK's corporate registry let directors rummage through rival records

(2026/03/16)


Companies House was forced to pull down its record-filing platform for the entire weekend to rectify a "security issue" that exposed the personal details of company directors and other data to any logged in users.

The government agency, which manages the UK's register of all businesses and their directors, temporarily shut down its WebFiling service on March 13 at 13.30 UTC following reports that hidden company details could be seen and modified.

In a statement, it confirmed techies resolved the flaw on and WebFiling was online again from 09.00 today.

[1]

While the mishap allowed directors to read and change hidden data belonging to other companies, in theory any individual could have created a company on the platform and abused the flaw.

[2]

[3]

"Our investigation has established that specific data from individual companies not normally published on the Companies House register may have been visible to other logged-in WebFiling users," Companies House CEO Andy King [4]said on Monday .

"This includes dates of birth, residential addresses, and company email addresses. It may also have been possible for unauthorized filings – such as accounts or changes of director – to have been made on another company's record."

[5]

King said passwords were not among the types of data accessible by other users, nor were documents related to identity verification, such as passports. "No existing filed documents, such as accounts or confirmation statements could have been altered.

"We believe that this issue could not have been used to extract data in large volumes or to access records systematically," he added. "Any access would have been limited to individual company records, viewed one at a time by a registered WebFiling user."

An internal investigation revealed that changes made to the WebFiling platform in October 2025 introduced the unexpected behavior, but attention was first drawn to it on March 13 by tax professional Dan Neidle.

[6]

The founder of Tax Policy Associates published [7]a video on social media depicting how the flaw could be abused to access other companies' data.

[8]Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters

[9]Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others

[10]Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns

[11]Google rushes Chrome update fixing two zero-days already under attack

Neidle said he was made aware of the flaw by John Hewitt, director of operations at Ghost Mail, and he then informed Companies House immediately.

Now fixed, a logged-in company director could exploit the flaw by starting from their own dashboard and then trying to log into another company's account.

Once they reach the [12]2FA block, which they would not be able to pass, all that was required was to click the browser's back button a few times. Typically, the user would be taken back to their own dashboard, but the bug instead returned them to the company they had tried to log into but couldn't.

Companies House said it reported the incident to the [13]Information Commissioner's Office and [14]National Cyber Security Centre , and continues to investigate whether the flaw was abused for real since October.

"If we find evidence that anyone has used this issue to access or change another company's details without authorization, we will take firm action," said King.

"I recognize that this incident will have caused concern and inconvenience to many of the companies and individuals who rely on our services. I am sorry for that.

"Companies House takes its responsibility to protect the data entrusted to us extremely seriously. We have taken swift action to secure and restore our service, and are committed to doing everything in our power to support those affected and to make sure that our services continue to merit the trust placed in them." ®

Get our [15]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2abg3NJiiVs0dji7xLLHaCQAAAYU&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44abg3NJiiVs0dji7xLLHaCQAAAYU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33abg3NJiiVs0dji7xLLHaCQAAAYU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://www.gov.uk/government/news/update-on-companies-house-webfiling-security-issue

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44abg3NJiiVs0dji7xLLHaCQAAAYU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33abg3NJiiVs0dji7xLLHaCQAAAYU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://x.com/DanNeidle/status/2032506756786511908

[8] https://www.theregister.com/2026/03/15/telus_breach_starbucks_attack/

[9] https://www.theregister.com/2026/03/13/vpn_clients_spoofed/

[10] https://www.theregister.com/2026/03/13/interpol_operation_synergia/

[11] https://www.theregister.com/2026/03/13/google_zeroday_chrome_update/

[12] https://www.theregister.com/2025/03/26/ncsc_influencers_2fa/

[13] https://www.theregister.com/2026/02/24/ico_fines_reddit/

[14] https://www.theregister.com/2026/01/19/dont_underestimate_prorussia_hacktivists_warns/

[15] https://whitepapers.theregister.com/



"Companies House takes its responsibility to protect the data entrusted to us extremely seriously"

Ken G

No, not that seriously, stupid boy.

Re: "Companies House takes its responsibility to protect the data entrusted to us..."

Ascy

Exactly! I think they should be taken at their word and then asked the follow up question: "Given that you take security extremely seriously and yet failed so miserably and something so basic, does that mean you're in fact completely incompetent?"

IR35

elsergiovolador

^^ Gift that keeps on giving.

A trivially-preventable security flaw

Anonymous Coward

Does anyone know just how easy these types of flaws are to prevent with good coding practices?

Don't answer that. The £4 million consultants are already hot on the trail.

Re: A trivially-preventable security flaw

elsergiovolador

Consultants receive scraps. The money goes to consultancies that cream the margin thanks to being exempt from IR35.

Re: A trivially-preventable security flaw

Jamie Jones

Exactly. This wasn't a "bug", but a fundamental design flaw

Intentional or plausible deniability?

Anonymous Coward

Things that make you go hmmmmmm. Didn’t we discuss this in 2014? Or am getting too old to remember? I expect a commission will be setup, it will run for years, and nothing notable will ever happen. Welcome to the U.K. public sector IT professionals! Latest I heard on x was that this was open for 5 months! I suspect it was a lot longer.

Oh, by the way, which one's Pink?
-- Pink Floyd