Bad vibes only: A zero-day flaw in popular sex toy app Lovense can leak usernames, email addresses, and other, err, intimate details

The Lovense remote-control app is seen on a phone screen in a darkened room.
(Image credit: Lovense)

Data security in this day and age was already a joke. Besides one accurately guessed password putting a 158-year old company out of business, hackers keep finding zero-day flaws in Chrome like it's going out of fashion. Speaking of, the latest data security punchline involves a zero-day flaw in Lovense, an app designed to remotely control a number of different sex toys—and before you ask, yes, my family is always telling me how proud they are of what I do for a living.

Simply by knowing someone's Lovense username, hackers can reportedly leverage the zero-day flaw to get at users' email addresses and potentially more private information too (via Bleeping Computer). Worse still, it turns out that simply by knowing a user's email address, hackers can then also hijack their Lovense account.

The vulnerability was believed to have been first reported to the company back in March, with security researcher BobDaHacker sharing a public blog post in June that breaks down the technical ins and outs of the vulnerability. In Bob's own words, "It all started when I was using the Lovense app and muted someone. That's it. Just muted them. But then I saw the API response and was like... wait, is that an email address? Why is that there?"

While it's 'haha very funny' that not even your sex toy with app integration is safe from data breaches, it remains hilarious only up until a sufficiently motivated bad actor follows the breadcrumb trail of user details in the Lovense app to somewhere that hits uncomfortably close to home. As amusing as the thought of a rogue vibrator is, these two vulnerabilities present serious doxing concerns for both regular users and cam performers alike. Unfortunately, this story gets worse.

By Bob's own admission, it turns out Lovense has been aware of the account takeover issue since at least 2023, when it was first flagged by software engineer Krissy. Lovense has repeatedly claimed to have fixed the issue since then. However, testing by Bob and fellow security researchers Eva and Rebane discovered these fixes left much to be desired as potentially account exposing gtokens could still be generated as of July 28, 2025.

So, why is the platform dragging their feet over such a major security flaw? Lovense apparently told Bob over email that "resolving the root cause involves deeper architectural work" that "would disrupt support for legacy versions." To recap, this is regarding a security flaw the company has been aware of in some form for nearly two years already.

Bob advises Lovense users to either only use throwaway email addresses, or to otherwise have a long hard "think about if you trust a company that takes 4+ months to half-fix critical bugs."

HP OMEN 35L
Best gaming PC 2025

👉Check out our full guide👈

1. Best overall:
HP Omen 35L

2. Best budget:
Lenovo Legion Tower 5i

3. Best compact:
Velocity Micro Raptor ES40

4. Alienware:
Alienware Aurora

5. Best mini PC:
Minisforum AtomMan G7 PT

TOPICS
Jess Kinghorn
Hardware Writer

Jess has been writing about games for over ten years, spending the last seven working on print publications PLAY and Official PlayStation Magazine. When she’s not writing about all things hardware here, she’s getting cosy with a horror classic, ranting about a cult hit to a captive audience, or tinkering with some tabletop nonsense.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.