1. https://appdevelopermagazine.com/ios
  2. https://appdevelopermagazine.com/ios-fitness-app-fitify-exposes-138k-user-private-photos/
7/25/2025 10:35:02 AM
iOS fitness app Fitify exposes 138K user private photos
Fitify Data Leak,Fitness App Privacy,Cloud Storage Security,User Photo Exposure
/iOS-fitness-app-Fitify-exposes-138K-user-private-photos-App-Developer-Magazine_2wb55hu8.jpg
App Developer Magazine
iOS fitness app Fitify exposes 138K user private photos

iOS

iOS fitness app Fitify exposes 138K user private photos


Friday, July 25, 2025

Austin Harris Austin Harris

While data breaches happen often, the shocking revelation that iOS fitness app Fitify exposes 138K user private photos highlights the urgent need for stronger cloud security and user data protection across all popular fitness platforms worldwide.

Fitify’s publicly accessible Google cloud storage bucket has exposed hundreds of thousands of files. Some of the files were user-uploaded progress pictures that individuals upload to track their body changes over time. After Cybernews contacted the company, the unprotected instance was closed.

iOS fitness app Fitify exposes 138K user private photos: Key takeaways

  • Fitify exposed 373K files including 138K progress photos through unsecured Google cloud storage.
  • Progress photos often showed minimal clothing, making exposure particularly sensitive for users.
  • Private user data was accessible without passwords or security keys.
  • App contained hardcoded secrets that could enable attackers to access more user data.

Unfortunately, uploading media online always brings some risks, even when the recipient is a trusted vendor. Enter: Fitify, a popular fitness app with over 10 million downloads from the Google Play store and an estimated 25 million total installs across all platforms.

In early May, the Cybernews research team discovered a Fitify-owned and publicly accessible Google cloud storage bucket. While most of the files exposed in the unprotected instance were workout plans and instruction videos, researchers also noticed photos that users shared with the app’s “AI coach” and their body scans.

Fitify app leaks user photos

The app’s target audience is users who want to lose weight, get in shape, or otherwise better their body. Body scans allow the tracking of changes over time, as Fitify users exercise or diet according to their fitness plan. Fitify’s Google App store description clearly states that “data is encrypted in transit,” providing reassurance to users that their private photos won’t be exposed.

However, the Cybernews team, or anyone else for that matter, could access the cloud storage without any passwords or security keys.

“It is also worthwhile to note that 'progress pictures' and ‘body scans’ are often captured with minimal clothing to better showcase the progress of weight loss and muscle growth. Therefore, most of the leaked images might be of the types that users normally would like to keep private and not share with anyone on the internet,” the team said.

Fitify Workouts, the company behind the app, responded after being contacted by Cybernews researchers and closed the exposed instance, removing it from the public site.

Cybernews’ journalists have reached out to the company for official comment and will update the article once they receive a reply.

What’s the extent of the Fitify data leak?

The now-closed Google cloud storage bucket contained a total of 373,000 files. Two hundred and six thousand of these were user profile photos, and another 138,000 were labeled as progress pictures. Thirteen thousand of the files were shared via the app’s AI coach message attachments, and another 6,000 were labeled as “Body Scan” data, including pictures and AI metadata.

The body scan feature allows users to make a 3D scan of their body, with the app providing a detailed analysis of their lean mass, body fat, posture, and other aspects they may want to improve or track.

“The leak shows that the access controls implemented by the app were insufficient to secure user data, and the fact that this data could be accessed by anyone without any passwords or keys demonstrates that user data was not encrypted at rest,” the team explained.

After discovering the exposed instance, the researchers cross-checked whether Fitify’s name was included in the randomly selected dataset, which the team used to investigate how secure Apple App Store’s apps actually are.

Cybernews researchers downloaded 156,000 iOS apps, around 8% of all apps on the Apple App Store, and discovered that developers often leave plaintext credentials in the application code accessible to anyone.

The findings revealed that 71% of the apps analyzed leak at least one secret, with an average app's code exposing 5.2 secrets. It turns out that Fitify was no different.

“After investigating the exposed secrets, we discovered credentials that could potentially be used to access even more customer data and the application’s backend infrastructure,” the team explained.

“It also shows that the misconfigured cloud bucket access controls weren't the only mistake made by the app’s developers, as numerous API Keys and sensitive endpoint locations were also hardcoded within the app’s front-end.”

What hardcoded secrets did the Fitify app expose?

Developers hardcode secrets for numerous reasons. While sometimes necessary for the app to function properly, some secrets and keys should not be kept accessible as they allow attackers to dive deep into the app and potentially access private user data.

The research team noted different types of secrets between development and production environments. Fitify’s development environment had the following hardcoded secrets exposed:

  • Android Client ID
  • Google Client ID
  • Google API Key
  • Firebase URL
  • Google App ID
  • Project ID
  • Storage Bucket
     

Attackers could use IDs and keys to access Google and Firebase infrastructure components, gather information, and then dig into the app, potentially obtaining sensitive user data.

For example, exposing Google Client ID and Android Client ID could enable malicious actors to impersonate legitimate app instances, potentially gaining access to user accounts. At the same time, the storage bucket could enable attackers to inject malicious files or modify existing content.

Meanwhile, Fitify’s production environment had the following hardcoded secrets:

  • Android Client ID
  • Google Client ID
  • Google API Key
  • Firebase URL
  • Google App ID
  • Project ID
  • Storage Bucket
  • Facebook App ID
  • Facebook Client Token
  • Firebase Dynamic Custom Domains
  • Algolia API Key
     

Coupled with previously leaked information, hardcoded secrets may enable attackers to access users’ social media data through Fitify. Combined with Google credentials, this creates multiple attack vectors for scenarios affecting both fitness data and social media profiles.

Our researchers note that the Algolia API Key is one of the less commonly leaked secrets. Algolia provides software and tools that allow businesses to implement rapid web search for individual websites. The research team did not test the leaked API key, so it is unclear what data the database stores.

How to fix leaky apps?

Our researchers believe that to effectively mitigate the issue, it’s best to focus on exposed instances and hardcoded secrets separately.

To fix cloud storage bucket-related issues, the team advises:

  • Configuring the cloud storage buckets' built-in authentication features to restrict access to only the employees and systems that are meant to access the stored data.
     

Meanwhile, to prevent apps’ secrets from falling into the wrong hands, the team advises the following:

  • Leaked credentials need to be revoked.
  • New credentials should be generated and stored securely within the company-controlled servers.
  • Access control settings need to be reviewed for the exposed endpoints.
  • It is recommended to perform an audit to determine if these vulnerabilities and misconfigurations were exploited by malicious actors.
  • The application needs to be updated to be compatible with the new, more secure infrastructure.
     

His Secret Past was Exposed by World's Most Mysterious Hackers






Subscribe to App Developer Magazine

Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.

MEMBERS GET ACCESS TO

  • - Exclusive content from leaders in the industry
  • - Q&A articles from industry leaders
  • - Tips and tricks from the most successful developers weekly
  • - Monthly issues, including all 90+ back-issues since 2012
  • - Event discounts and early-bird signups
  • - Gain insight from top achievers in the app store
  • - Learn what tools to use, what SDK's to use, and more

    Subscribe here



Featured Stories


The App Economy Is Thriving
The App Economy Is Thriving Monday, April 20, 2026




NIKKE 3.5 anniversary update livestream coming soon
NIKKE 3.5 anniversary update livestream coming soon Friday, April 17, 2026


New AI tool targets early dementia detection
New AI tool targets early dementia detection Thursday, April 16, 2026


Jentic launch gives AI agents api access
Jentic launch gives AI agents api access Wednesday, April 15, 2026


Experts warn ai-generated health content risks misinterpretation without human oversight
Experts warn ai-generated health content risks misinterpretation without human oversight Wednesday, April 15, 2026


Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines
Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines Tuesday, April 14, 2026


AccuWeather Launches ChatGPT Integration for Live Weather Updates
AccuWeather Launches ChatGPT Integration for Live Weather Updates Tuesday, April 14, 2026


Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance
Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance Tuesday, April 14, 2026


IT spending rises as banks balance legacy and innovation
IT spending rises as banks balance legacy and innovation Monday, April 13, 2026


Tech hiring slumps as Software Developer job postings fall
Tech hiring slumps as Software Developer job postings fall Monday, April 13, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>