Skip to content

Menu

  • CURRENT WORLD GAME
  • LICENSE BY HARVARD UNIVERSITY
  • LIVECHAT/DISCORD
  • ORDER SERVER
  • OUR MEMBER LIST
  • POEM OF US
  • WATCH LIVE ANIME

Archives

  • July 2025

Calendar

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
     

Categories

  • 0day
  • 0day Anime Watch Online
  • AI Secret
  • AntiVirus Evasion Technique
  • Blackcat Anime
  • Crayon Sinchan
  • Demon School! Iruma-kun
  • Donald Duck And Friend
  • Dr. Stone Season 1
  • Dr. Stone Season 2
  • Exploit-0day
  • Fairy Tail
  • God and Christianity
  • How Everything Work PHD Thesis
  • Hunter X Hunter
  • Lord Jesus Christ
  • PHD THESIS
  • Project
  • Public-Release-Code
  • Ragna Crimson
  • Rurouni Kenshin -Kyoto Disturbance-
  • Security Tutorial
  • The Seven Dealy Sins
  • Uncategorized
  • World Game By Us
  • World Havoc Tarif
  • World Tarif Secret
  • WormGPT

Copyright [ 0day (xc) Our ] Whitehat Hacker Team Official Website 2025 | Theme by ThemeinProgress | Proudly powered by WordPress

  • CURRENT WORLD GAME
  • LICENSE BY HARVARD UNIVERSITY
  • LIVECHAT/DISCORD
  • ORDER SERVER
  • OUR MEMBER LIST
  • POEM OF US
  • WATCH LIVE ANIME
[ 0day (xc) Our ] Whitehat Hacker Team Official Website
You are here :
  • Home
  • 0day
  • Bug Hunters Gain Access to 64 Million McDonald’s Job Applicants’ Info by Using the Password ‘123456’
Written by skraitoJuly 12, 2025

Bug Hunters Gain Access to 64 Million McDonald’s Job Applicants’ Info by Using the Password ‘123456’

0day Article

Tens of millions of job applicants’ information could be accessed via a very flimsy login credential.

A recruitment platform used by McDonald’s is alleged to have had such poor cybersecurity that researchers were able to log into it using a non-password and thus gain access to information on tens of millions of job applicants, including contact details and chat logs between the user and the restaurant’s AI bot.

The platform in question, called McHire, operates a chatbot, dubbed Olivia. Job applicants chat with Olivia, who, in an effort to decide whether they’re worthy of flipping hamburgers or not, assesses them via a personality test. The bot was created by a company called Paradox.ai.

Security researchers Sam Curry and Ian Carroll found that, using the username/password combination 123456/123456, they were able to log into the application, where they were given access to a treasure trove of information on job applicants. Indeed, Curry and Carroll were able to “retrieve the personal data of more than 64 million applicants,” the researchers write.

Their write-up is as hilarious as it is disturbing. The duo notes:

“Without much thought, we entered “123456” as the username and “123456” as the password and were surprised to see we were immediately logged in! It turned out we had become the administrator of a test restaurant inside the McHire system.

The information included names, email addresses, phone numbers, addresses, the state where the job candidate lived, and the auth token they used to gain access to the website. Additionally, Curry and Carroll could see “every chat interaction [from every person] that has ever applied for a job at McDonald’s.”

It’s all pretty shameful stuff, although not particularly surprising. Cybersecurity has never been prioritized in the corporate world, which is why everything is getting hacked all the time. Many software programs are designed without any apparent concern for security at all. Still, the level of incompetence here is pretty damn bad and should be considered embarrassing for everyone involved.

Curry and Carroll write that they disclosed the security problems to Paradox.ai and McDonald’s on June 30th. On the same day, the restaurant chain confirmed that the credentials in question were “no longer usable to access the app.” On July 1st, Paradox.ai. communicated to the researchers that the issues had “been resolved.” In a blog post, Paradox clarified what had happened: “On June 30, two security researchers reached out to the Paradox team about a vulnerability on our system. We promptly investigated the issue and resolved it within a few hours of being notified.” The company went on to say:

Using a legacy password, the researchers logged into a Paradox test account related to a single Paradox client instance. We’ve updated our password security standards since the account was created, but this test account’s password was never updated. Once logged into the test account, the researchers identified an API endpoint vulnerability that allowed them to access information related to chat interactions in the affected client instance. Unfortunately, none of our penetration tests previously identified the issue.

You may also like

[ 0day (xc) Our ] PHD THESIS , Why Cigarette , Coffee , Blood Test , Alcohol And Urine Test And Even Sickness Which is BY this thesis We only give example of sickness call Headache by skraito With Lord Jesus Christ … .

[ 0day (xc) Our ] File Upload Vulnerabilities and Security Best Practices by skraitow ( Lord Jesus Christ ) with skraito , HAVE FUN READING … .

[ 0day (xc) Our ] Pew Pew 0day MikroTik RouterOS Cross Site Scripting 2025 Code by skraito with skraitow … . Have Fun Patching it … .

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • July 2025

Calendar

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
     

Categories

  • 0day
  • 0day Anime Watch Online
  • AI Secret
  • AntiVirus Evasion Technique
  • Blackcat Anime
  • Crayon Sinchan
  • Demon School! Iruma-kun
  • Donald Duck And Friend
  • Dr. Stone Season 1
  • Dr. Stone Season 2
  • Exploit-0day
  • Fairy Tail
  • God and Christianity
  • How Everything Work PHD Thesis
  • Hunter X Hunter
  • Lord Jesus Christ
  • PHD THESIS
  • Project
  • Public-Release-Code
  • Ragna Crimson
  • Rurouni Kenshin -Kyoto Disturbance-
  • Security Tutorial
  • The Seven Dealy Sins
  • Uncategorized
  • World Game By Us
  • World Havoc Tarif
  • World Tarif Secret
  • WormGPT

[ 0day (xc) Our ] CopyRight License Apply ... .