Popular Android Mental Health Apps Expose Sensitive User Data Through Security Flaws
#Vulnerabilities

Popular Android Mental Health Apps Expose Sensitive User Data Through Security Flaws

Security Reporter
3 min read

Security researchers found 1,575 vulnerabilities across 10 mental health apps with over 14.7 million combined installs, exposing therapy records and sensitive medical data to potential exploitation.

Featured image

Security researchers have uncovered significant vulnerabilities in popular Android mental health applications, putting sensitive therapy records and personal medical data at risk. An analysis of 10 mental health apps with over 14.7 million combined installs revealed 1,575 security flaws, including 54 high-severity and 538 medium-severity vulnerabilities that could expose confidential user information.

"Mental health data carries unique risks," explains Sergey Toshin, founder of mobile security firm Oversecured that conducted the research. "On the dark web, therapy records sell for $1,000 or more per record, far more than credit card numbers." This premium value makes mental health applications particularly attractive targets for attackers seeking sensitive personal information.

The vulnerabilities span multiple categories of security weaknesses:

App Type Installs High Severity Medium Severity Low Severity Total Issues
Mood & habit tracker 10M+ 1 147 189 337
AI therapy chatbot 1M+ 23 63 169 255
AI emotional health platform 1M+ 13 124 78 215
Health & symptom tracker 500k+ 7 31 173 211
Depression management tool 100k+ 0 66 91 157
CBT-based anxiety app 500k+ 3 45 62 110
Online therapy community 1M+ 7 20 71 98
Anxiety & phobia self-help 50k+ 0 15 54 69
Military stress management 50k+ 0 12 50 62
AI CBT chatbot 500k+ 0 15 46 61

Wiz

Technical analysis revealed several critical weaknesses:

  • Insecure data handling: Multiple apps stored therapy notes, CBT session details, and mood logs in locally accessible storage, allowing any app on the device to read sensitive health information
  • Intent validation flaws: One app with over 1 million downloads used Intent.parseUri() without proper validation, enabling attackers to force access to internal activities handling authentication tokens
  • Weak cryptography: Several apps relied on java.util.Random for generating session tokens and encryption keys, creating predictable values that undermine security
  • Missing root detection: Most apps lacked root/jailbreak detection, granting full data access to any malicious app with root privileges
  • Hardcoded secrets: Plaintext configuration data including API endpoints and Firebase database URLs were discovered within APK resources

Six of the ten analyzed apps claimed to encrypt user conversations or keep chats private, but researchers found these security promises didn't match implementation realities. Four apps hadn't been updated since November 2025, with one last updated in September 2024, leaving vulnerabilities unpatched for extended periods.

Practical Protection Measures

For users:

  1. Verify app update frequency before installation (Settings > App Info)
  2. Limit sharing of sensitive medical details until apps demonstrate improved security
  3. Consider web-based alternatives with recent security audits
  4. Avoid using mental health apps on rooted devices

For developers:

  1. Implement proper input validation for all user-controlled data
  2. Replace insecure storage with Android's EncryptedSharedPreferences
  3. Use cryptographically secure random generators (SecureRandom)
  4. Add root detection mechanisms
  5. Regularly audit dependencies for known vulnerabilities

These findings highlight the urgent need for improved security standards in mental health applications. As Toshin notes, "These apps collect therapy transcripts, mood logs, medication schedules, and self-harm indicators - some of the most sensitive personal data in mobile." Until developers prioritize security equally with functionality, users should exercise caution when entrusting apps with intimate health details.

Researchers note that while no critical vulnerabilities were found, the volume and nature of medium/high severity flaws create significant risk exposure. Oversecured continues responsible disclosure processes with affected vendors.

Comments

Loading comments...