Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Launch 700 meters ahead of GPT-5 for 700 meter weekly users with chat rocket, Reasoning Superpower

    August 5, 2025

    Here are 6 sites that require age verification – will you be affected?

    August 5, 2025

    Top mobile phones under Rs 15,000 in India (August 2025): Redmi Note 14 SE 5G, Tecno Pova 7, IQoo Z10X, and more

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»‘123456’ password exposes chat for 64 million McDonald’s job applicants
    Security

    ‘123456’ password exposes chat for 64 million McDonald’s job applicants

    PineapplesUpdateBy PineapplesUpdateJuly 12, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    ‘123456’ password exposes chat for 64 million McDonald’s job applicants
    Share
    Facebook Twitter LinkedIn Pinterest Email

    ‘123456’ password exposes chat for 64 million McDonald’s job applicants

    Cyber security researchers discovered a vulnerability in McDonald’s, McDonald’s Chatbot Job Application Platform, which highlighted more than 64 million job applicants chat across the United States.

    The defect was discovered by safety researchers Ian Carol and Sam Curry, who found that the administrator panel of the chatbot used a test franchise, which was preserved by a login name “123456” and a password of “123456”.

    Mchire, operated by Paradox.ai and is used by about 90% of the McDonald’s franchise, accepts job applications through a chatbot called Olivia. Applicants can submit names, email addresses, phone numbers, home addresses and availability, and are required to complete a personality test as part of the job application process.

    Once logged in, the researchers submitted a job application to the test franchise to see how the process works.

    During this test, he noticed that the HTTP requests were sent to API & Point/API/Lead/CEM-Xhr, which used a parameter lead_ID, which was 64,185,742 in his case.

    Researchers found that by increasing and decreasing the lead_ID parameters, they were able to highlight the personal data of full chat tape, session tokens and real job applicants who were first applicable to McHere.

    This type of defect is called an IDOR (unprotected direct object reference) vulnerability, when an application exposes internal object identifiers, such as a record number, without verifying whether the user is really authorized to reach data.

    “During a cursory security review of a few hours, we identified two serious issues: McHeire Administration Interface for the owners of the restaurant accepted the default credentials 123456: 123456, and an unsafe direct object reference (IDOR) on an internal API allowed us to use any contact and chat,” Carol. Explained in a rightup About the defect.

    “Together they allowed us and someone else with a McHare account and access to any inboxes to regain personal data of more than 64 million applicants.”

    In this case, in a request, the lead_ID number was raised or reduced or sensitive data related to other applicants was returned, as the API failed to check whether the user had access to data.

    Exploitation of Ider bug to see McDonald's job applications
    Exploitation of Ider bug to see McDonald’s job applications

    The issue was reported to Paradox.ai and McDonalds on 30 June.

    McDonald’s accepted the report within an hour, and the default administrator Creedians were soon disabled.

    McDonald’s said, “We are disappointed with this unacceptable vulnerability from a third-party provider, Paradox.ai. As soon as we learned about the issue, we made Paradox.ai mandatory to immediately remove the issue, and it was resolved on the same day that we were told,” McDonldes told. Wire In a statement about research.

    Paradox deployed a fix to address the Ider Flaw and confirmed that vulnerability was reduced. Paradox.ai is Since it is said It is reviewing its system to prevent similar major issues from recurring.

    Paradox also stated bleepingcomputer that information would be any chatbot interaction, such as clicking on a button, even if no personal information has been recorded.

    Update 7/11/25: Information was added from the contradiction.


    Tines needle

    While cloud attacks can be more sophisticated, the attackers still succeed with surprisingly simple techniques.

    Drawing by the detection of Vij in thousands of organizations, this report reveals the 8 major techniques used by Claude-Floid danger actors.

    applicants chat exposes job McDonalds million password
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI am the owner of three of these incredible withdrawable hoses, and they are on sale until ending tonight
    Next Article Startups Weekly: Still running. Tekkachchan
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Launch 700 meters ahead of GPT-5 for 700 meter weekly users with chat rocket, Reasoning Superpower

    August 5, 2025
    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Security

    Fashion giant channel hit salesforce data theft attacks

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Launch 700 meters ahead of GPT-5 for 700 meter weekly users with chat rocket, Reasoning Superpower

    August 5, 2025

    Here are 6 sites that require age verification – will you be affected?

    August 5, 2025

    Top mobile phones under Rs 15,000 in India (August 2025): Redmi Note 14 SE 5G, Tecno Pova 7, IQoo Z10X, and more

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.