“Although the app tries to force single sign-on (SSO) for McDonald’s, there is a smaller link for ‘Paradox team members’ that caught our eye,” Carroll said. “Without much thought, we entered ‘123456’ as the password and were surprised to see we were immediately logged in!”
Once inside, researchers additionally discovered an internal API endpoint using a predictable parameter to fetch applicant data. By simply decrementing the ID value, Caroll and Curry retrieved full applicant PII, including chat transcripts, contact info, and job-form data. This IDOR exploit exposed not just contact details but also timestamps, shift preferences, personality test outcomes, and even tokens that could impersonate candidates on McHire.
“This incident is a prime example of what happens when organizations deploy technology without an understanding of how it works or how it can be operated by untrusted users,” Desired Effect CEO Evan Dornbush said. “With AI systems handling millions of sensitive data points, organizations must invest in understanding and mitigating pre-emergent threats, or they’ll find themselves playing catch-up, with their customers’ trust on the line.”