gelzinn avatar
Back

Firebase vulnerability

a recent incident on September 3, 2025 exposed a critical security gap in applications relying on Google's Firebase Cloud Messaging (FCM). this wasn’t just a bug—it highlighted a widespread vulnerability that developers need to pay attention to today

the heart of the problem

a security researcher discovered that many android apps were embedding their FCM server keys directly inside their .apk files. since these files can be easily decompiled, attackers could extract these keys without much effort

what could they do with a server key?

this wasn't a theoretical vulnerability. it was exploited in the wild, affecting major apps like microsoft teams and deliveroo, and leading to massive spam campaigns. the core issue wasn't a flaw in Firebase itself, but rather in how developers were storing and using their keys

what does this mean for you?

while my library, Refirebase, simplifies working with firestore, auth, storage, and more, it doesn't manage your FCM keys. that responsibility is still yours

the key takeaway is simple: never, ever, embed server keys or sensitive credentials on the client-side. this includes your mobile app, your frontend, or any code that runs on a user's device

how to protect yourself

so, what’s the right way to handle this?

the temptation to take shortcuts is always there, especially when you're trying to ship fast. but when it comes to security, cutting corners can have disastrous consequences for you and your users. stay safe and keep your keys on the server