A PayPal app coding error leaked customers' Social Security numbers and financial details for six months, leading to unauthorized transactions and mandatory breach notifications under GDPR and CCPA.

PayPal has disclosed a significant data breach affecting approximately 100 customers, caused by a coding flaw in its Working Capital loan application that exposed highly sensitive personal information for nearly six months. The incident highlights critical failures in data protection protocols and triggers mandatory reporting obligations under major privacy regulations.
What Happened: Code Change Sparks Months-Long Leak
Between July 1, 2025, and December 13, 2025, a defective code deployment in PayPal's business lending platform inadvertently made customers' personal information publicly accessible. The exposed data included full names, Social Security numbers, dates of birth, email addresses, phone numbers, and business addresses – a comprehensive identity theft toolkit. According to PayPal's February 10 breach notification, the flaw was discovered on December 12 during routine monitoring, but remained undetected for 164 days.
In what PayPal described as "a few" cases, attackers exploited the leaked data to conduct unauthorized transactions. All affected customers received full refunds, though the company hasn't specified transaction amounts or whether secondary fraud attempts occurred. Following discovery, PayPal immediately rolled back the faulty code and forced password resets for compromised accounts.
Legal Ramifications: GDPR and CCPA Compliance Failures
This breach triggers strict notification requirements under both the EU's General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA). Under GDPR Article 33, companies must report breaches affecting European residents within 72 hours of discovery – a timeline PayPal met with its February notifications. For U.S. customers, CCPA mandates disclosure when Social Security numbers and financial data are compromised.
Regulators could impose substantial penalties given the sensitivity of exposed data. GDPR fines reach up to 4% of global annual revenue (PayPal reported $29.8 billion in 2025), while CCPA violations carry $2,500-$7,500 per intentional violation. With names and SSNs exposed, all 100 cases qualify for maximum penalties under California law – potentially totaling $750,000 before GDPR fines are calculated.
User Impact: Beyond Refunds and Monitoring
While PayPal offered two years of credit monitoring and refunded fraudulent transactions, the exposure creates long-term risks:
- Identity Theft Vulnerability: Social Security numbers and birthdates can't be reset like passwords, leaving victims exposed for years
- Business Compromise: Exposed business addresses and contact details enable sophisticated phishing targeting financial operations
- Psychological Toll: Customers face ongoing vigilance against financial fraud despite PayPal's remediation
The breach disproportionately impacts small business owners who rely on PayPal Working Capital loans – a group already vulnerable to cash flow disruptions from fraud.
Systemic Failures and Pattern of Security Lapses
This incident marks PayPal's second major breach in three years. In December 2022, credential-stuffing attacks compromised 35,000 accounts, exposing similar personal data including tax IDs. Repeated incidents suggest inadequate security testing protocols, particularly for financial products handling sensitive data.
PayPal's statement that "systems were not compromised" attempts to distinguish this code error from external hacks, but regulators may view the distinction as irrelevant given the preventable nature of the exposure. Financial institutions face heightened expectations for code deployment safeguards under both GDPR's "security by design" principles and CCPA's reasonable security requirements.
What Changes: Compliance Wake-Up Call
Beyond rolling back the faulty code, PayPal must demonstrate concrete improvements:
- Enhanced Code Review: Implementing mandatory security validation for financial application updates
- Stricter Access Controls: Limiting exposure of sensitive fields even during development
- Proactive Monitoring: Deploying data leak detection for PII beyond payment transactions
The breach underscores how simple coding errors can violate multiple privacy regulations simultaneously. Companies handling financial data must now assume that any PII exposure – whether from hackers or internal mistakes – will trigger cross-jurisdictional scrutiny and consumer compensation requirements. As regulatory bodies increase GDPR/CCPA enforcement, PayPal's response will serve as a benchmark for breach remediation in fintech.

Comments
Please log in or register to join the discussion