A security vulnerability in Disputifier, a popular Shopify chargeback management app, was exploited on January 9, 2026, to process unauthorized refunds and access data from over 200,000 merchant stores. The breach occurred after the company allegedly refused to engage with a security researcher who discovered the flaw.

Incident overview

AttributeDetails
Affected appDisputifier (Shopify chargeback management)
Merchants on platform3,000+ active
Records exposed200,000+ store records
Attack window~1 hour
Exploitation dateJanuary 9, 2026
App statusDelisted from Shopify App Store

Timeline

TimeEvent
Prior to Jan 9Security researcher @BagAnnihilator discovers vulnerability
UnknownDisputifier allegedly declines bug bounty negotiation
Jan 9, ~10:00 AM PSTExploitation begins
Jan 9, ~11:00 AM PSTVulnerability detected
Jan 9, ~12:00 PM PSTVulnerability permanently resolved
Jan 9, afternoonDisputifier delisted from Shopify App Store
Jan 9Public disclosure by researcher

The vulnerability

The flaw stemmed from API keys exposed in the application’s frontend:

IssueImpact
Shopify API credentials in client-side codeTrivially extractable by attackers
No backend validationFrontend tokens accepted by API
Overprivileged tokensFull merchant account access

Exploitation capabilities

CapabilityMethod
Authenticate as merchantUse extracted Shopify API credentials
Process unauthorized refundsAPI access to order management
Access merchant dataFull account visibility
Enumerate other merchantsCross-platform data discovery

The vulnerability also allowed authenticated users to enumerate merchant data across the platform—meaning one compromised account could discover information about other merchants.

Data exposed

Data typeExposed
Merchant namesYes
Email addressesYes
Mailing addressesYes
Store namesYes
Shopify URLsYes
Phone numbersYes
API tokensYes (prior to remediation)
Third-party service credentialsYes
Payment processor credentialsYes

Disputifier stated the incident affected “fewer than 0.1% of customers”—but with 200,000+ merchants on the platform, this still represents hundreds of affected businesses.

Financial impact

The attacker used exposed credentials to automate refunds:

ImpactDetails
Unauthorized refundsAutomated across multiple stores
Refund cancellationMost reversed by payment processors
Disputifier commitment100% reimbursement of remaining losses
Merchant financial lossExpected to be zero (after reimbursement)

One report described how the attacker “exploited an API leak to trigger millions in refunds across multiple stores in seconds.”

Disclosure controversy

Security researcher @BagAnnihilator publicly disclosed the breach after Disputifier allegedly refused to engage in bug bounty negotiations.

PhaseEvent
DiscoveryResearcher identifies API token exposure
OutreachResearcher contacts Disputifier
ResponseCompany allegedly declines bug bounty
Public disclosureResearcher goes public
ExploitationAttack occurs during disclosure window

The bug bounty problem

Without bounty programWith bounty program
Researcher has no incentive to waitCoordinated disclosure
Public disclosure forces attentionPrivate fix development
Exploitation window createdMinimal exposure
Everyone losesControlled resolution

The incident underscores a persistent problem: when companies dismiss security researchers, everyone loses.

Disputifier’s response

Immediate fixes

ActionPurpose
Hardened web server firewall rulesBlock attack vectors
Removed code paths exposing data to frontendEliminate token exposure
Filtering and redaction for Shopify tokensPrevent API response leaks

Longer-term improvements

ActionPurpose
Database-level encryption for Shopify tokensDefense in depth
Merchant data enumeration fixPrevent cross-account access
Refund limitsReduce blast radius
Rate limit monitoringDetect anomalous activity

Law enforcement

Disputifier stated they are “actively cooperating with law enforcement in their investigation.”

Lessons for Shopify merchants

App permission review

ConsiderationAction
API scopesReview what access apps request
Refund permissionsLegitimate for chargeback apps but dangerous if abused
Data accessUnderstand what merchants data apps can see

Third-party integration audit

RiskMitigation
Credential storageAny app storing API credentials is a single point of failure
Connected servicesDisputifier breach exposed other integrated service credentials
Cascading compromiseOne breach can affect multiple platforms

Monitoring recommendations

MonitorAlert on
Refund activityBulk refunds, unusual hours
API usageUnexpected patterns
Account changesNew integrations, permission modifications

Credential rotation plan

ScenarioAction
Third-party app breachRotate all shared credentials immediately
Suspicious activityRevoke and regenerate API tokens
Regular maintenancePeriodic credential rotation

The broader API security problem

IssueImpact
Frontend credential exposureTrivially extractable
Overprivileged tokensMore access than necessary
Inadequate monitoringAnomalous usage not detected
Supply chain riskThird-party apps become attack vectors

API security best practices

PracticeImplementation
Never expose credentials in frontendUse backend proxy for API calls
Least privilegeRequest minimum necessary permissions
Token rotationRegular credential refresh
MonitoringAlert on anomalous API patterns
Rate limitingPrevent bulk operations

Platform response

Shopify’s decision to delist Disputifier sends a clear message about platform security expectations.

Platform actionSignal
App delistingSecurity failures have consequences
InvestigationPlatforms monitor app behavior
Merchant protectionPlatform prioritizes user security

However, merchants remain responsible for vetting apps they install and monitoring for abuse.

Recommendations

For Shopify merchants

PriorityAction
ImmediateAudit installed apps and their permissions
HighRemove apps you don’t actively use
HighSet up refund activity alerts
MediumReview connected third-party services
OngoingMonitor for unauthorized changes

For app developers

PriorityAction
CriticalNever expose API credentials in frontend code
CriticalEstablish bug bounty or vulnerability disclosure program
HighImplement least-privilege API access
HighMonitor for anomalous usage patterns
OngoingRegular security audits

For platform providers

PriorityAction
HighRequire security standards for app store listings
HighProvide merchants with API usage visibility
MediumFacilitate secure credential storage patterns
OngoingMonitor third-party app security practices

Context

The Disputifier breach illustrates why API security has become a critical discipline. The combination of frontend credential exposure, overprivileged tokens, and inadequate monitoring created a vulnerability that allowed attackers to cause immediate financial harm to merchants.

The disclosure controversy adds another dimension: companies that dismiss security researchers create incentives for public disclosure, which can lead to exploitation during the disclosure window. Bug bounty programs exist precisely to prevent this outcome.

For Shopify merchants, the incident is a reminder that every app installation expands the attack surface. The convenience of third-party integrations comes with security responsibility that many merchants may not fully appreciate.