A misconfigured online database exposed the personal information of parents and children connected to thousands of childcare and early education centers, leaving sensitive records openly accessible on the internet without authentication.

A misconfigured online database exposed the personal information of parents and children connected to thousands of childcare and early education centers, leaving sensitive records openly accessible on the internet without authentication.
The exposed system was a publicly reachable Elasticsearch database containing more than 140,000 records tied to childcare operations. The data appears to originate from LineLeader, a customer relationship management platform widely used by preschools and daycare centers to handle enrollment inquiries, parent communications, and prospective leads. LineLeader is operated by CRM Web Solutions LLC, a Texas-based technology company that markets its platform to more than 9,000 childcare centers worldwide and supports roughly 200,000 monthly users.
The leaked records were categorized as leads, inquiries, and children, indicating that the database belonged to an active production environment rather than a test system. The exposed information included full names, email addresses, and phone numbers, with records directly linking parents to their children. This structure placed entire families at risk by revealing personal identifiable information for both adults and minors in a single dataset.
The exposure raised serious safety and privacy concerns, as the data could be exploited for phishing attacks, impersonation of schools or childcare providers, and identity theft. By directly associating children with their parents’ contact details, the dataset created opportunities for highly targeted social engineering schemes.
The database was left accessible due to a configuration error that allowed unrestricted access without password protection. This type of misconfiguration remains one of the most common causes of large-scale data leaks across industries, particularly in systems built on Elasticsearch.
The unsecured instance was reported through responsible disclosure channels, and access has since been restricted. CRM Web Solutions LLC has not issued a public statement and has not confirmed whether affected childcare organizations or families have been notified.
Data security failures involving children’s information are viewed as especially serious because of the long-term privacy and safety risks involved. Similar incidents have occurred in recent years due to the same type of configuration oversight. In 2023, a parental control application exposed hundreds of millions of records containing private user activity after leaving its Elasticsearch database unsecured, with signs that the data may have already been accessed by malicious actors. In 2024, the same service was found exposing sensitive data from minors’ devices through an unauthenticated messaging infrastructure.
Other education-related technology providers have also faced comparable incidents, including systems used by hundreds of schools that leaked photographs of minors, home addresses, and official documents due to improperly secured databases.
© 2025, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543