Update 17/12/25 – 12:44 pm (IST): The situation took a confusing turn when SELO revealed that HackerOne had initially closed the report as “Informative,” dismissing the exploit as a mere “display inconsistency” rather than a security flaw.

hacker-one-report-xchat-loophole

However, following that public disclosure, X engineering lead Mike (@cambridgemike) stepped in to contradict the rejection. He assured the researcher that the team has actually been treating the issue as a “top priority” since it was reported and is now actively looking into the HackerOne submission.

x-response-xchat-loophole


Original article published on December 16, 2025, follows:

A developer and security researcher known as SELO has uncovered a startling vulnerability in X’s messaging infrastructure, specifically within group chats. The flaw effectively allows users to forge replies to messages that never existed.

This isn’t just a UI glitch where a message looks funny on your own screen. According to the proof-of-concept video shared by the developer, the exploit allows an attacker to inject a reply that references a fake message, making it appear to everyone in the chat as if a specific user said something they absolutely did not.

In the video shared on X, we see a script running alongside the chat interface. The script executes, and suddenly, reply bubbles appear in the conversation thread quoting “original” messages that aren’t actually there. For this demo, SELO makes it seem like the replies are to messages from “Elon Musk” and “Nikita Bier,” even though obviously neither of the two had any messages. This creates a seamless illusion of a conversation that never happened.

When asked if this was a client-side issue, SELO clarified that the problem lies deeper.

“There’s no verification of if the message that’s being replied to is valid or even sent by the said user,” SELO explained. “They do not verify the contents neither, so anybody could send a message that looks like a real reply within a group chat with whatever content they want.”

xchat-forging-replies-bug

This is a massive oversight in how the platform handles message IDs. In a secure messaging environment, the server should validate that the message ID being replied to actually exists and matches the content being quoted. X apparently skips this step entirely.

It’s worth noting that we are familiar with SELO’s work. We recently covered how X shut down XGlobalRank, another project by the same developer that aimed to bring transparency to the platform’s ranking system. It seems they have a knack for poking holes in Elon Musk’s app.

The implications here are genuinely concerning. As one user pointed out in the replies, this is the “perfect tool for some serious gaslighting.”

While some users are jokingly asking for the script to “stir up trouble,” others are rightly pointing out that this highlights significant gaps in the engineering team’s QA process.

X has not yet officially acknowledged the flaw. However, given the severity of a bug that undermines the basic trust of private communication, we expect a patch — or at least a server-side hotfix — to roll out very soon.

Until then, if you see a screenshot of a DM or a group chat reply that looks suspicious, take it with a massive grain of salt. The message you’re looking at might literally be a ghost.

Dwayne Cubbins
1842 Posts

My fascination with Android phones began the moment I got my hands on one. Since then, I've been on a journey to decode the ever-evolving tech landscape, fueled by a passion for both the "how" and the "why." Since 2018, I've been crafting content that empowers users and demystifies the tech world. From in-depth how-to guides that unlock your phone's potential to breaking news based on original research, I strive to make tech accessible and engaging.

Next article View Article

Many WhatsApp Business Web users unable to link devices as QR scan keeps failing

WhatsApp Business is in the middle of a crisis that's been quietly destroying small businesses for over a week. Since December 8, thousands of WhatsApp Business Web users across...
Dec 16, 2025 2 Min Read