What happened?
Security researchers at Cybernews discovered that Consentik - a highly-rated Shopify app that adds cookie-consent banners - was running an unsecured Apache Kafka server. For at least 100 days (mid-January to 28 May 2025), that server streamed private data from every connected store directly to the open internet.
Data exposed
-
Shopify Personal Access Tokens - could give an attacker full administrative control over a store (product listings, orders, customer data, theme code, etc.).
-
Facebook/Meta Ads tokens - allowed the launch of fraudulent ad campaigns at the merchant’s expense.
-
Real-time site analytics events - offered reconnaissance data for targeted attacks.
Scale of the risk
Consentik is a relatively popular tool. It has a 4.9-star rating, bears Shopify’s “Made for Shopify” badge, and, according to Storeleads data quoted by TechRadar, is installed on approximately 4,180 stores across fashion, cosmetics, fitness, and electronics sectors.
Timeline
|
Date (2025) |
Event |
|
15 Apr |
Researchers verify the leak |
|
18 Apr |
Initial responsible-disclosure notice sent to developer (Omegatheme) |
|
28 May |
Kafka server is secured, and the leak is closed |
|
15-17 Jul |
Public reporting by Cybernews, TechRadar, and others |
Potential impact
-
A valid personal access token lets an attacker reconfigure the entire storefront, inject malicious JavaScript, scrape customer PII, or swap the theme for a phishing clone.
-
Compromised Facebook tokens can drain ad budgets and damage a brand’s reputation with fraudulent campaigns.
-
In jurisdictions such as the EU (GDPR) and California (CCPA), unprotected personal data can trigger regulatory penalties and civil litigation.
Responses so far
-
Omegatheme secured the server shortly after being notified but has not issued a public explanation.
-
Shopify has likewise not published an official statement as of 18 July 2025. No evidence of large-scale exploitation has surfaced, but forensic confirmation is inherently difficult.
Why does this matter beyond Consentik
The incident underscores an ecosystem-wide weakness: third-party apps often enjoy administrator-level API rights, yet even top-rated, “vetted” plugins can mishandle that access. Merchants, therefore, take a part of the security burden.
Practical steps for affected (or cautious) merchants
-
Rotate all Shopify personal access tokens issued to Consentik or any other high-privilege app.
-
Re-issue Facebook/Meta Ads tokens and review ad-spend logs for anomalies.
-
Audit app permissions: favour app-scoped or read-only tokens where possible.
-
Check storefront themes for unauthorized edits between January and May 2025.
-
Enable alerting for new staff/API accounts, theme changes, and bulk discount edits.
-
Document the incident internally - some data protection laws impose breach assessment or reporting duties even if the fault lies with a supplier.
Bottom line
Consentik’s leak is a reminder that compliance plugins are not automatically secure. Stars, badges, and marketplace vetting reduce risk, but they do not eliminate it. Regular token rotation, least-privilege access, and continuous log monitoring remain essential, even for apps whose sole purpose is to “protect” privacy.


