By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Lovense sex toy app flaw leaks private user email addresses
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Lovense sex toy app flaw leaks private user email addresses
Tech News

Lovense sex toy app flaw leaks private user email addresses

By admin 8 Min Read
Share
SHARE

The connected sex toy platform Lovense is vulnerable to a zero-day flaw that allows an attacker to get access to a member’s email address simply by knowing their username, putting them at risk of doxxing and harassment.

Lovense is an interactive sex toy manufacturer, best known for producing app-controlled sex toys with names like the Lush, the Gush, and, perhaps most boldly, the Kraken. The company claims to have 20 million customers worldwide.

While Lovense toys are commonly used for both local and long-distance entertainment, they are also popular among cam models who allow viewers to tip or subscribe for remote control of their toys.

However, the connected experience can also expose their Lovense username, and due to this flaw, potentially reveal their private email address.

Lovense usernames are often publicly shared on forums and social media, making them easy targets for attackers.

The flaw was discovered by security researcher BobDaHacker, who collaborated with researchers Eva and Rebane to reverse engineer the app and automate the attack.

The researchers disclosed two flaws over four months ago, on March 26, 2025. However, only one of the flaws, a critical account hijacking flaw, was subsequently fixed.

The Lovense flaws

The vulnerability stems from the interaction between Lovense’s XMPP chat system, used for communication between users, and the platform’s backend.

“So it all started when I was using the Lovense app and muted someone. That’s it. Just muted them,” explains BobDaHacker’s report.

“But then I saw the API response and was like… wait, is that an email address? Why is that there? After digging deeper, I figured out how to turn any username into their email address.”

To exploit the flaw, an attacker makes a POST request to the /api/wear/genGtoken API endpoint with their credentials, which returns a gtoken (authentication token) and AES-CBC encryption keys.

The attacker then takes any publicly known Lovense username and encrypts it using the retrieved encryption keys. This encrypted payload is sent to the /app/ajaxCheckEmailOrUserIdRegisted?email={encrypted_username} API endpoint.

The server responds with data containing a fake email address, which the researcher converted into a fake Jabber ID (JID) used by Lovense’s XMPP server.

By adding this fake JID to their XMPP contact list and sending a presence subscription over XMPP (similar to a friend request), the attacker can refresh the roster (contact list), which now includes both the fake JID and the real one associated with the target’s account. 

However, the problem is that the real JID is constructed using the user’s actual email, in the format username!!!domain.com_w@im.lovense.com, allowing attackers to extract the victim’s email address.

For example, if it returned bleeping!!!example.com_w@im.lovense.com, the resulting actual email of the Lovense account is bleeping@example.com.

The researchers confirmed that the entire process can be completed in less than one second per user with a script. BleepingComputer created a fake account today and shared our username with BobDaHacker, allowing them to simply connect as a friend and return the email we registered with.

The researcher also stated that it’s not necessary to accept a friend request to exploit the flaw.

BleepingComputer also confirmed that it is relatively easy to find legitimate usernames on forums and Lovense-related sites, like lovenselife.com.

The researcher also claims that the FanBerry extension, created by Lovense, can be used to harvest usernames as many of the cam models use the same username, making wide-scale email harvesting possible.

The researchers also discovered a critical vulnerability that let them completely hijack an account.

Using only an email address, an attacker could generate authentication tokens without needing a password. Using these tokens, an attacker could impersonate a user on Lovense platforms, including Lovense Connect, StreamMaster, and Cam101.

These tokens reportedly worked on admin accounts as well.

While Lovense has mitigated this flaw by rejecting the tokens on its APIs, the researchers noted that gtokens can still be generated without a password.

Both issues were reported to Lovense on March 26, 2025. In April, after also submitting the bugs on HackerOne, Lovense informed the researchers that the email issue was already known and fixed in an upcoming version.

The company initially downplayed the account hijacking flaw, but after being told it could allow full admin account access, Lovense reclassified it as critical.

In total, the researchers received $3,000 for the disclosure of the flaws.

On June 4, the company claimed the flaws were fixed, but the researchers confirmed this was not the case. Lovense ultimately fixed the account hijack flaw in July but stated that it would take approximately 14 months to resolve the email flaw, as it would break compatibility with older versions of their app.

“We’ve launched a long-term remediation plan that will take approximately ten months, with at least four more months required to fully implement a complete solution,” Lovense told the researcher.

“We also evaluated a faster, one-month fix. However, it would require forcing all users to upgrade immediately, which would disrupt support for legacy versions. We’ve decided against this approach in favor of a more stable and user-friendly solution.”

The researchers criticized this response, stating the company repeatedly claimed the issues were fixed when they were not.

“Your users deserve better. Stop putting old app support over security. Actually fix things. And test your fixes before saying they work,” BobDaHacker wrote in the report.

Ultimately, Lovense says they deployed a proxy feature on July 3rd that was suggested by the researchers to mitigate the attack. However, even after doing a force update of the app, the flaw was not fixed, so its unclear what was changed.

In 2016, multiple Lovense flaws exposed email addresses or allowed attackers to determine if an email address had an accoune at Lovense.

BleepingComputer reached out to Lovense for comment but did not receive a response.

Wiz

Contain emerging threats in real time – before they impact your business.

Learn how cloud detection and response (CDR) gives security teams the edge they need in this practical, no-nonsense guide.

You Might Also Like

RedClick dublinbikes Hits 40 Million Journeys Milestone, Unveils Custom Art Bike by Holly Pereira

6 Best Carpet Cleaners (2025), Tested and Reviewed

Rishi Sunak joins Anthropic, Microsoft as senior adviser

Figure 03 Humanoid Robot: A New Era of AI-Powered Companions

A Knight of the Seven Kingdoms Release Date, Cast, Plot and Trailer

TAGGED: Email Address, Lovense, Sex Toy, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Colorado lawmaker faces ‘bullying’ claims from past Larimer County post, complaint from fellow legislator
Next Article 25 Best Cheap Watches Under $1,000 (2025): Timex, Hamilton, and Seiko
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Israelis praise Trump at huge rally ahead of expected hostage release by Hamas in Gaza
World News
Truce fizzles as US-China trade tensions return to full boil
Business
Bitcoin Rally Met With Institutional Call Selling In Options Market – Details
Crypto
Fire TV Soundbar Is Selling for Pennies Post Prime Day, Now 5x Less Than Sony or Bose Rivals
Gaming News
Relax, Bitcoin is going to be ok, even if BTC lost 13% in 8 hours: The proof is in the data
Crypto
RedClick dublinbikes Hits 40 Million Journeys Milestone, Unveils Custom Art Bike by Holly Pereira
Tech News
6 Best Carpet Cleaners (2025), Tested and Reviewed
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Israelis praise Trump at huge rally ahead of expected hostage release by Hamas in Gaza

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Israelis praise Trump at huge rally ahead of expected hostage release by Hamas in Gaza
October 11, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?