Security researchers found 1,575 vulnerabilities across 10 mental health apps with over 14.7 million combined installs, exposing therapy records and sensitive medical data to potential exploitation.

Security researchers have uncovered significant vulnerabilities in popular Android mental health applications, putting sensitive therapy records and personal medical data at risk. An analysis of 10 mental health apps with over 14.7 million combined installs revealed 1,575 security flaws, including 54 high-severity and 538 medium-severity vulnerabilities that could expose confidential user information.
"Mental health data carries unique risks," explains Sergey Toshin, founder of mobile security firm Oversecured that conducted the research. "On the dark web, therapy records sell for $1,000 or more per record, far more than credit card numbers." This premium value makes mental health applications particularly attractive targets for attackers seeking sensitive personal information.
The vulnerabilities span multiple categories of security weaknesses:
| App Type | Installs | High Severity | Medium Severity | Low Severity | Total Issues |
|---|---|---|---|---|---|
| Mood & habit tracker | 10M+ | 1 | 147 | 189 | 337 |
| AI therapy chatbot | 1M+ | 23 | 63 | 169 | 255 |
| AI emotional health platform | 1M+ | 13 | 124 | 78 | 215 |
| Health & symptom tracker | 500k+ | 7 | 31 | 173 | 211 |
| Depression management tool | 100k+ | 0 | 66 | 91 | 157 |
| CBT-based anxiety app | 500k+ | 3 | 45 | 62 | 110 |
| Online therapy community | 1M+ | 7 | 20 | 71 | 98 |
| Anxiety & phobia self-help | 50k+ | 0 | 15 | 54 | 69 |
| Military stress management | 50k+ | 0 | 12 | 50 | 62 |
| AI CBT chatbot | 500k+ | 0 | 15 | 46 | 61 |

Technical analysis revealed several critical weaknesses:
- Insecure data handling: Multiple apps stored therapy notes, CBT session details, and mood logs in locally accessible storage, allowing any app on the device to read sensitive health information
- Intent validation flaws: One app with over 1 million downloads used
Intent.parseUri()without proper validation, enabling attackers to force access to internal activities handling authentication tokens - Weak cryptography: Several apps relied on
java.util.Randomfor generating session tokens and encryption keys, creating predictable values that undermine security - Missing root detection: Most apps lacked root/jailbreak detection, granting full data access to any malicious app with root privileges
- Hardcoded secrets: Plaintext configuration data including API endpoints and Firebase database URLs were discovered within APK resources
Six of the ten analyzed apps claimed to encrypt user conversations or keep chats private, but researchers found these security promises didn't match implementation realities. Four apps hadn't been updated since November 2025, with one last updated in September 2024, leaving vulnerabilities unpatched for extended periods.
Practical Protection Measures
For users:
- Verify app update frequency before installation (Settings > App Info)
- Limit sharing of sensitive medical details until apps demonstrate improved security
- Consider web-based alternatives with recent security audits
- Avoid using mental health apps on rooted devices
For developers:
- Implement proper input validation for all user-controlled data
- Replace insecure storage with Android's EncryptedSharedPreferences
- Use cryptographically secure random generators (SecureRandom)
- Add root detection mechanisms
- Regularly audit dependencies for known vulnerabilities
These findings highlight the urgent need for improved security standards in mental health applications. As Toshin notes, "These apps collect therapy transcripts, mood logs, medication schedules, and self-harm indicators - some of the most sensitive personal data in mobile." Until developers prioritize security equally with functionality, users should exercise caution when entrusting apps with intimate health details.
Researchers note that while no critical vulnerabilities were found, the volume and nature of medium/high severity flaws create significant risk exposure. Oversecured continues responsible disclosure processes with affected vendors.

Comments
Please log in or register to join the discussion