CRITICAL SEVERITYRetail

CafePress Data Breach

CafePress Custom Merchandise Marketplace Breach (2019): 23 Million Customer Records Including Passwords & Home Address Exposed

Custom merchandise and print-on-demand marketplace.

Verified by ObscureIQ Intelligence

8.0Severity
23.6MRecords
6Fields
2019Year

ObscureIQ Breach Intelligence Scores
2.5
Breach Risk Index
10
Data Value
25
Market Recency
512
days
Since Breach

Risk Interpretation

Exposure enables phishing, seller impersonation, order fraud, and account abuse. Custom-product and storefront data may also reveal political, cultural, or personal affiliations.

🎯 Impact & Downstream Threats

In February 2019 an attacker exploited multiple security vulnerabilities to access CafePress systems, stealing data for approximately 23 million accounts including email addresses, names, physical addresses, security question answers, weakly encrypted passwords, tens of thousands of partial payment card numbers, and more than 180,000 Social Security numbers stored in plaintext. The company was notified of the breach in March 2019 by a security researcher but concealed the incident for six months

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
Credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat

📋 Breach Intelligence

EntityCafePress
Organization • USA
Breach Date2019-02-19
Disclosure2019-09-05
DBC Added2024-12-01
Added Date2024-12-01
Records~23.6M (23,579,964 records)
Attack VectorMisconfiguration
Data SubjectsCustomer: Direct
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityStandard
CA Reported2019-09-05
Breach ID238;239
StatusConfirmed

📝 Executive Summary

CafePress, the custom merchandise and print-on-demand marketplace, suffered a data breach in February 2019 when attackers exploited security misconfigurations to access its user database. The stolen cache contained records for approximately 23.6 million accounts. The company was alerted to the breach by a security researcher in March 2019 and separately warned by a foreign government in April 2019 that customer data was already circulating on dark web markets. CafePress quietly forced password resets but offered no explanation, and did not notify customers until September 2019, one month after media outlets broke the story publicly. The exposed data included email addresses, full names, home addresses, phone numbers, and passwords hashed with outdated, unsalted SHA-1 encoding, a method considered insecure and easily reversed. The breach also exposed millions of unencrypted security question answers, tens of thousands of partial payment card numbers, and more than 180,000 Social Security numbers stored in plaintext. For affected individuals, this combination creates serious risk of credential stuffing, identity theft, and targeted phishing. Because CafePress is a print-on-demand platform, custom product and storefront data may also expose personal affiliations that users would not expect to be part of a merchandise site's breach. The Federal Trade Commission filed a complaint against both the former owner, Residual Pumpkin Entity LLC, and current owner PlanetArt in 2022, citing weak security practices, plaintext storage of sensitive data, and misrepresentation of the company's data security. The settlement required Residual Pumpkin to pay $500,000 in redress, with refunds distributed to individuals whose Social Security numbers were exposed beginning in September 2024. Both companies were also required to implement comprehensive security programs including multi-factor authentication. People affected by this breach remain at elevated risk for identity fraud and should monitor their credit and any accounts where they reused the same password.

🏢 About CafePress

CafePress is a custom merchandise and print-on-demand marketplace where independent sellers — called shopkeepers — design and sell personalized products including apparel, mugs, and accessories. The platform connects individual designers with buyers and takes a commission on sales. CafePress was acquired by Snapfish parent company PlanetArt in 2020, having previously operated under Residual Pumpkin Entity LLC.

Platform | Custom merchandise and print-on-demand commerce | Print-on-demand marketplace | USA
USAcafepress.com

🗂 Why They Hold Your Data

Print-on-demand marketplaces collect buyer and seller identity, addresses, payment-adjacent data, order history, storefront activity, and custom-product records across creator commerce workflows.

📰 Recent Developments

CafePress continues to operate under PlanetArt's ownership following a corporate restructure. The platform operates in a crowded custom merchandise market alongside competitors including Redbubble and Printful. The FTC enforcement action and required security improvements represent the most significant organizational consequence of the breach period.

🔍 Data Points Exposed

6 verified field types:
Password
Email
Phone Number
Name
Home Address;Email
Names
Passwords
Phone numbers
Physical addresses

Exposure Categories

LocationPHYS ADDR

Canonical Fields

email_address, full_name, password, phone_number, physical_address, physical_address:home

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of CafePress
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationRetailEmailPhoneAddressPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom