$600 Bounty: How Revealed Hidden Read Receipts in Bumble’s Chat API
Bumble应用的API泄露了消息阅读状态,尽管UI显示“已送达”,但实际可获取读取信息。此漏洞由安全研究员发现并获得奖励,凸显了后端API对隐私保护的重要性。 2025-7-6 06:24:32 Author: infosecwriteups.com(查看原文) 阅读量:20 收藏

Exploiting an Overlooked API Endpoint to Access Private Read Statuses — Even When the UI Said Delivered

Monika sharma

Introduction

In messaging apps, privacy expectations are everything. Some users want the read notification, others prefer ambiguity. Bumble chose the latter — messages show delivered but never read preserving a sense of privacy.

But what if the app lied?

Security researcher @ndrong discovered that Bumble’s backend API quietly betrayed this promise, exposing read status of messages even when the frontend never showed them. The flaw earned a $600 bounty and highlights the subtle power of backend APIs — and the risks of mismatched client-server behavior.

On Bumble’s mobile app, messages show whether they were delivered — but crucially not whether they were read. The same goes for the web app, which provides an even more stripped-down experience.

This design choice implies user privacy: your matches won’t know if you’ve read their messages — so no pressure, right?


文章来源: https://infosecwriteups.com/600-bounty-how-revealed-hidden-read-receipts-in-bumbles-chat-api-53bc06c987f5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh