McDonald's AI chatbot for hiring is compromised in embarrassing fashion with '123456' password

This is an unbelievable blunder, really, that potentially exposed the personal details of 64 million job applicants who used the McHire platform.

McDonald's AI chatbot for hiring is compromised in embarrassing fashion with '123456' password
Comment IconFacebook IconX IconReddit Icon
Tech Reporter
Published
1 minute & 30 seconds read time
TL;DR: A security researcher exposed a major vulnerability in the McHire recruitment platform powered by an AI chatbot, allowing access to the personal data of 64 million applicants in an unencrypted form. The flaw was promptly fixed after disclosure, but it's almost unbelievable that such a basic username and password were employed by the maker of the chatbot.

We're all familiar with the passwords that should never, ever be used - like 'password' for example - but people still employ such cringeworthy efforts, and so do big organizations, it seems.

Conversation with the Olivia chatbot (Image Credit: Ian Carroll)
Conversation with the Olivia chatbot (Image Credit: Ian Carroll)

In this case, as TechSpot reports, a security researcher, Ian Carroll, managed to gain access to an admin account for the McHire platform, used to facilitate recruitment for McDonald's. It does this using a chatbot (Olivia) made by Paradox.ai.

Carroll achieved this when looking at the portal for McDonald's restaurant owners to log in to view their applicants, where there was also a link for Paradox.ai staff to log in. Clicking through to the latter, and using '123456' for both the user and password allowed a successful sign-in - to the researcher's disbelief - but only to a sample restaurant and related details (for internal testing).

While examining test conversations with the chatbot in this account, Carroll noticed an "interesting API to fetch the candidate information" and observes in a blog post:

"The main parameter of this request was the lead_id of the chat, which for our test applicant was about 64,185,742. We tried decrementing this number, and were immediately faced with PII from another McDonald's applicant (including "unmasked" contact data)!"

Using this method, the researcher could now access 64 million applicants and various personal details, all in unencrypted form. That included their name, email address, phone number, address, and the authorization token to log on as the user in the consumer portal, giving access to their chat messages to the bot.

Worrying? Yes, very much so for those who have applied for a role via this system.

The security hole was quickly shut down as soon as Carroll informed both McDonald's and Paradox.ai of the problem, as you'd expect. Still, this is one of the more eyebrow-raising security fumbles we've ever seen, without a doubt.

Photo of the ASUS Vivobook Go 15.6" FHD Slim Laptop, AMD Ryzen 3 7320U Quad Core Processor, 8GB DDR5 RAM, 128GB SSD, Windows 11 Home
Best Deals: ASUS Vivobook Go 15.6" FHD Slim Laptop, AMD Ryzen 3 7320U Quad Core Processor, 8GB DDR5 RAM, 128GB SSD, Windows 11 Home
Today7 days ago30 days ago
$246.78 USD$246.78 USD
$246.78 USD$246.78 USD
£336.23-
$246.78 USD$246.78 USD
Check PriceCheck Price
* Prices last scanned 4/22/2026 at 10:57 pm CDT - prices may be inaccurate. As an Amazon Associate, we earn from qualifying purchases. We earn affiliate commission from any Newegg or PCCG sales.

Tech Reporter

Email IconX IconLinkedIn Icon

Darren has written for numerous magazines and websites in the technology world for almost 30 years, including TechRadar, PC Gamer, Eurogamer, Computeractive, and many more. He worked on his first magazine (PC Home) long before Google and most of the rest of the web existed. In his spare time, he can be found gaming, going to the gym, and writing books (his debut novel - 'I Know What You Did Last Supper' - was published by Hachette UK in 2013).

Follow TweakTown on Google News
Newsletter Subscription