Submit #781761: Dialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposureinfo

TitleDialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposure
DescriptionIn the Android application ca.diagram.dialogue version 4.3.2, a hardcoded Segment write key was discovered in the source file res/raw/config.json. An attacker can extract this key through reverse engineering and use it to send arbitrary tracking events and modify user profiles via Segment’s API. This allows injection of fraudulent analytics data, potentially leading to corrupted business intelligence, incorrect user segmentation, and misuse of downstream systems that rely on this data.
Source⚠️ https://www.notion.so/Segment-Write-Key-Exposure-Leading-to-Data-Injection-and-User-Profile-Manipulation-In-ca-diagram-dia-3262de3f97fb802fb5f0d2c9d179dcf6?source=copy_link
User
 fxizenta (UID 28116)
Submission03/17/2026 14:06 (20 days ago)
Moderation04/03/2026 00:15 (16 days later)
StatusAccepted
VulDB entry355043 [Dialogue App up to 4.3.2 on Android ca.diagram.dialogue config.json SEGMENT_WRITE_KEY hard-coded key]
Points17

Do you want to use VulDB in your project?

Use the official API to access entries easily!