Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google

Shopify Chargeback App Exposed 200,000+ Merchant Records After Rejecting Bug Bounty

Disputifier security flaw leaked merchant data for months. Company declined white-hat help before breach went public.

A critical vulnerability in Disputifier, a popular Shopify chargeback management platform used by over 3,000 merchants, exposed sensitive business data belonging to more than 200,000 stores—and the company turned down researchers who offered to help fix it first.

Security researcher Serb, operating under the handle @BagAnnihilator on X, disclosed the breach after Disputifier allegedly refused to engage in bug bounty negotiations or accept assistance in patching the flaw. "The vulnerability left every single piece of data available for extraction," Serb wrote, posting evidence that included store names, Shopify URLs, owner details, email addresses, phone numbers, complete business addresses, API tokens, and payment processor credentials.

The leaked screenshots reveal an alarming scope: numbered entries exceeding 1,800 stores with "total alert counts" ranging from 66 to 69 per merchant, alongside unmasked Shopify authentication tokens that could grant attackers direct access to store backends. 

One exposed record showed full merchant details, including CRM integrations (Shopify, Konnektive), billing configurations, and API keys—the digital skeleton keys to entire e-commerce operations.

What makes this incident particularly troubling is the timeline. The vulnerability reportedly existed long enough for researchers to discover it, attempt responsible disclosure, and ultimately go public after being rebuffed. 

Disputifier has acknowledged the incident but has not publicly detailed when the exposure began, how many records were actually accessed by malicious actors, or why they declined the researchers' offer to coordinate a fix privately.

For affected merchants, the risk extends beyond privacy concerns. Exposed API tokens could enable account takeovers, fraudulent transactions, or data manipulation. Payment processor credentials (Shopify, Stripe, PayPal) in the wrong hands create direct financial exposure.

Immediate Actions for Disputifier Users:

  • Rotate all Shopify API keys and access tokens immediately
  • Review recent store access logs for suspicious activity
  • Update payment gateway credentials
  • Monitor bank accounts and processor dashboards for unauthorised transactions
  • Consider the temporary removal of the Disputifier integration until security assurances are provided

The incident underscores a persistent problem in the SaaS ecosystem: when companies dismiss security researchers, everyone loses. Bug bounties exist precisely to prevent these public disclosures—and the real-world damage that follows.

Post a Comment