The Anatomy of an Insecure Portal: Practice by Numbers Breach Analysis
A critical security vulnerability within the Practice by Numbers dental management platform has exposed a significant weakness in how niche SaaS providers handle patient data. The platform, which serves over 5,000 dental clinics nationwide, suffered from an Insecure Direct Object Reference (IDOR) flaw—a textbook but preventable oversight that compromised sensitive health information.
The vulnerability allowed authenticated users to bypass authorization controls entirely. By simply modifying the numerical identifier within the web browser’s URL, users could gain unauthorized access to the medical records, identification documents, and health histories of other patients. Because these document identifiers were assigned in a predictable, incremental sequence, the barrier to entry was effectively non-existent.
The Security Implications of IDOR Flaws
The issue discovered by researcher Cox demonstrates the danger of relying on security through obscurity. When a system uses sequential indexing for sensitive assets like medical charts, it assumes that an attacker lacks the intent or capability to manipulate parameters.
In the modern threat landscape, this assumption is catastrophic. IDOR vulnerabilities remain one of the most common web application weaknesses, yet they are easily mitigated through proper access control implementation—ensuring that the server validates whether the requester has permission to view a specific record before serving the content.
Systemic Failures in Vulnerability Disclosure
Beyond the technical failure, the incident highlights a broader industry problem: the absence of standardized reporting mechanisms. Independent security researchers often find themselves hitting a wall when they identify vulnerabilities, as many SMB-focused SaaS companies lack formal Vulnerability Disclosure Programs (VDPs).
Without a clear channel to report security gaps, findings often go unacknowledged, or worse, are ignored until they result in a data breach. Practice by Numbers has stated its intent to implement a reporting mechanism for security issues moving forward, yet the lack of a defined timeline suggests that secure disclosure is not currently a prioritized component of their development lifecycle.
Industry Standards and Third-Party Compliance
For companies managing Protected Health Information (PHI), the expectation for rigor is significantly higher. Healthcare-focused software providers are typically expected to undergo consistent third-party code reviews and penetration testing to preempt the emergence of such accessible exploits.
The fact that this vulnerability was discovered by a motivated user rather than a routine security audit points to a maturity gap within the dental software market. While Practice by Numbers claims no evidence of malicious exploitation prior to the researcher’s intervention, the reality remains that for a period, the architecture was essentially open to anyone with a patient login.
Moving Toward Proactive Healthcare Cybersecurity
This incident serves as a stark reminder to dental practices and similar healthcare providers that the security of their patient data is only as strong as the vendors they choose. As dental practices increasingly transition to cloud-based management suites, the vetting process must include an assessment of the vendor’s security posture, including the presence of an active bug bounty or vulnerability disclosure program.
For software developers, the message is clear: incremental, predictable identifiers are a liability. Implementing robust authorization checks and embracing transparent security disclosure policies are no longer optional value-adds—they are essential safeguards for companies entrusted with the most private aspects of consumer lives.
