App Store

    How do I request an expedited review for a security patch?

    An iOS developer at a laptop opening the Apple Developer Contact Us form to request an expedited App Review for a security patch already submitted to App Store Connect

    Your app is in App Store Connect with a serious security defect: a hard-coded API key that just landed in a public release bundle, a Supabase row level security policy that exposed user records, or an SDK update that fixes a CVE you only learned about an hour ago. Standard review is fast in 2026, but fast is not the same as Friday night emergency fast, and Google Play has no public expedite button at all. The question for the next ninety minutes is whether to ask Apple for an expedited App Review, what to put in the form, and what to do on the Google Play side where the same word does not even apply.

    Short answer

    Apple grants expedited App Review for critical security fixes through the Contact Us form at developer.apple.com/contact/app-store, reachable from Apple's App Review distribution page. Select Expedited App Review, identify the build in App Store Connect, and describe the security defect with specifics: what is exposed, who is affected, and what your patch changes. Apple states that 90 percent of submissions already clear in under 24 hours, so expedite is for cases where the standard queue is still too slow.

    What you should know

    • Apple's expedite path is a form, not a button inside the app entry. It lives under Contact Us on the App Review page; the option is named Expedited App Review.
    • Apple lists two qualifying reasons publicly: critical bug fixes and event-tied launches. Security defects fit under the critical bug umbrella.
    • Google Play has no parallel button. The Help link inside Google Play Console is the only escalation path, and Google does not commit to a turnaround.
    • The decision is human and conservative. Reviewers reject most expedite requests; the strongest cases name a CVE, a public disclosure, or a clear data exposure.
    • Each expedited approval is per submission, not per app. A future security patch starts the process over.
    • Standard App Review is already fast. Per Apple's distribution page, 90 percent of submissions are reviewed in under 24 hours.

    When does Apple actually grant an expedited App Review for a security fix?

    Apple does not publish acceptance criteria, but the public language on the App Review distribute page names critical bug fixes as one of the two qualifying cases for expedited review (the other being event-tied launches). A security defect that exposes user data, leaks credentials, or breaks a promise made under App Tracking Transparency fits cleanly under critical bug. What does not fit is a polish change framed as a security update, a refactor with no exploitable surface, or a regression that affects a tiny subset of devices.

    The judgement reviewers seem to apply, based on patterns reported on the Apple Developer Forums and Apple Community threads, is whether the patch reduces a measurable harm to users that would persist if review took its normal course. Apple has stated publicly that 90 percent of submissions clear in under 24 hours, so the implicit standard is harm avoided in the next 24 hours specifically.

    Three patterns get approved more often:

    1. A named CVE in a third-party SDK shipped with your app, where you can cite the CVE number and the SDK upgrade that fixes it.
    2. A live data exposure visible to the public, such as a misconfigured Supabase row level security policy, a leaked API key in a release bundle, or an open S3 bucket.
    3. A regression in your own code that bypasses authentication, leaks a session token, or breaks a payment safeguard.

    Three patterns get rejected:

    1. A pre-emptive hardening pass with no current exploit and no incident.
    2. A privacy manifest update or App Tracking Transparency tweak, since those have their own review path and are not user-facing emergencies.
    3. A general performance improvement that the developer rebrands as a security fix.

    What information should go in the expedited request form?

    The form is short, which makes the content of each field decisive. Use plain language, name the defect, and assume the reviewer has thirty seconds to decide.

    FieldWhat to putWhy it matters
    App and versionExact app name, bundle ID, and the version number currently in reviewReviewer needs to match the request to a specific build in the queue
    Issue summaryOne sentence: what is broken, who is exposedSets urgency context before the reviewer reads detail
    Technical detailCVE number, repository issue link, SDK version, exact code pathLets the reviewer verify the defect without a back-and-forth
    User impactHow many users, what data, what action they cannot take safelyEstablishes whether the harm is severe enough to skip the queue
    Fix descriptionWhat the patch changes, with file paths or method names where helpfulShows that the new build addresses the specific issue, not a sibling one
    Deadline justificationWhy the standard 24 hour queue is not fast enoughSeparates real urgency from operational inconvenience

    The single most common failure mode is vagueness in the issue summary. A line like critical security update is filler. A line like OAuth state parameter is not validated in version 3.2.4, allowing account takeover, fixed in 3.2.5 by adding state verification in AuthCallback.swift is the kind of summary that gets read in full.

    For builders who want an external automated read of the build to confirm the patch actually closes the vulnerability before the expedite request goes in, PTKD.com (https://ptkd.com) is one of the platforms focused on pre-submission scanning aligned with OWASP MASTG for no-code and vibe-coded apps, including checks for hard-coded secrets, exposed credentials, and missing privacy manifests.

    How does Google Play handle urgent security patches without an expedited button?

    Google has not published an expedite mechanism for Google Play Console. The path that works in practice has three pieces. The first is the Help link inside Play Console: open Help, search for Submit, then select Contact us or Get help on a specific submission. The form asks for the app and what you need. Use it, with the same specificity Apple expects.

    The second piece is managed publishing. Switch your release track to managed publishing before the security patch goes in. A managed release stays in your control after Google's review completes, so you can stage the patch and publish the moment review finishes rather than waiting for the auto-publish window. The Play Console publishing overview explains that managed publishing puts release timing in your hands.

    The third piece, used by teams who have built a relationship with Google through prior support tickets or Play Partner Manager access, is reaching out to the partner manager directly. This option is not available to most independent developers. For everyone else, the Help form is the only path, and a careful explanation of the security issue (CVE number, exposure scope, fix) appears to move the request faster than a generic urgent message.

    Google's published pre-review checks page notes that pre-review automated checks usually take less than 15 minutes and that passing them is not the same as passing the full review. Most updates clear within hours; some accounts and some app categories see review windows of up to seven days, especially after a policy strike or account flag.

    How long does an expedited review take in practice?

    Independent developer reports across Apple Developer Forums and Apple Community threads suggest an expedited App Review decision usually returns within 4 to 12 hours during weekdays, and within 24 hours including weekends. That decision is whether the expedite is granted, not whether the build itself passes. A granted expedite places the build at the front of the human reviewer queue; the review then runs at normal speed, which in many cases finishes within the same business day.

    On Google Play, the picture is different. The Help form yields a response from a support agent, who may or may not move the submission. Some teams report a one hour acknowledgement and a same-day publication. Others get a templated reply saying the review will complete on its normal schedule.

    The table below sketches what to expect on each store. Treat the times as directional, based on patterns reported by developers, not as a guarantee.

    AspectApple App StoreGoogle Play
    Public expedite mechanismYes, Contact Us form on the App Review pageNo
    Named qualifying reasonsCritical bug fix, event-tied launchNone published
    Typical decision time on the request4 to 24 hoursVariable, depends on the support agent
    What to attachApp, version, CVE or technical detail, user impact, fix descriptionCVE, exposure scope, fix, regulator or breach context
    Approval frequencyConservative, most requests rejectedConservative, no public statistics
    Per-submission scopeYes, each new submission needs its own requestSame, plus managed publishing as the in-house lever

    The expedite request only changes the position in the queue. The build still goes through Apple's automated checks: the privacy manifest scan that returns ITMS-91061, the required reason API scan that returns ITMS-91053, the App Transport Security validator, and the entitlement checks. A build that fails any of these will fail under an expedited review the same way it would under standard review. Submit a build you have already validated locally, ideally with Apple's App Review Guidelines open in a second tab so the patch does not introduce a Guideline 5.1.1 or Guideline 4.2 regression.

    What to watch out for

    • Each expedite is per submission. A future security patch starts the process over.
    • Burning the credit on a non-emergency lowers the chance of approval next time you have a real fire.
    • Automated checks still run. An expedite request does not skip the privacy manifest check, the missing API declaration check that returns ITMS-91053, or the binary validation that catches signing errors. Validate the build locally first.
    • Apple does not respond to expedite requests with reasons for rejection in most cases. Apply once, and if rejected, work the issue through the standard channel.
    • Google Play managed publishing must be enabled before the security patch is submitted, not after. Flipping the toggle on a submission already in review has no effect on that submission.
    • A security patch that also bumps the minimum iOS or Android version, or that adds a new SDK, is no longer a narrow fix. Apple and Google both treat scope expansion as a reason to apply standard review depth even when expedite is granted.

    Key takeaways

    • Apple's expedited App Review is a real path with a published form. Use it only when a measurable harm to users is in flight or imminent, and describe that harm in plain terms.
    • The form should name the app and version, describe the security defect with specifics, name the affected users, and describe the fix in enough detail for a reviewer to verify it in under a minute.
    • Google Play does not publish an expedite button. The Help link inside Play Console, plus managed publishing, is the closest path most teams have.
    • Standard App Review is already fast: Apple states that 90 percent of submissions clear in under 24 hours, so the cost of the standard queue is often smaller than the cost of a poorly justified expedite request.
    • Some teams use platforms like PTKD.com (https://ptkd.com) to run a pre-submission scan that confirms the security patch actually closes the vulnerability and does not introduce a Guideline 5.1.1 or ITMS-91053 regression before the expedite request is filed.
    • #expedited-review
    • #app-store-connect
    • #google-play-console
    • #security-patch
    • #critical-bug-fix
    • #app-review

    Frequently asked questions

    Can I request an expedited App Review more than once for the same security patch?
    Yes, but each expedite request applies to a single submission. If your first build is approved and Apple later finds another issue in a future submission, you have to request expedite again with fresh justification. Apple does not maintain a standing expedite flag on an app. Submitting multiple expedite requests for the same review attempt is generally counterproductive: a second request usually replaces the first in the reviewer's queue rather than reinforcing it.
    Does Apple require a CVE number for a security expedite request?
    No, but it helps. A CVE number ties your request to a public security record that Apple's reviewers can verify in seconds. For defects in third-party SDKs, naming the CVE and the fixed SDK version is the strongest signal. For defects in your own code, describe the exposure plainly: what data was accessible, how many users, and what the patch changes. The reviewer is checking for a real, verifiable, in-progress harm rather than a generic hardening pass.
    Will Google Play actually move my security fix faster if I message support?
    Sometimes. Google does not publicly commit to a faster track, and many support responses are templated. The cases that appear to move are those where the message names a CVE, attaches a public disclosure, references a regulator inquiry, or describes a live data leak with scope. Vague urgent language tends to receive standard timeline responses. Managed publishing is the lever you control directly: it lets you publish the moment review clears.
    Is an expedited App Review a separate queue, or just a flag on the standard queue?
    Based on patterns reported on the Apple Developer Forums, an approved expedite request appears to move the build to the front of the human reviewer queue rather than creating a separate technical track. Automated checks (privacy manifest scan, missing API declaration scan, binary validation) still run, and any failure there stops the build the same way it would in a standard submission. The speed gain is at the human review stage, not the static analysis stage.
    Do I lose the ability to request expedite again if Apple denies my first request?
    No. A denial does not blacklist your account, but it does set a tone for future requests. Apple's reviewers see the history of past expedite asks. Repeated requests for issues that do not meet the critical bug bar can lead to longer review times for later expedites, based on patterns reported by developers. Make each request count: cite the defect, the user impact, and the fix in specific terms.

    Keep reading

    Scan your app in minutes

    Upload an APK, AAB, or IPA. PTKD returns an OWASP-aligned report with copy-paste fixes.

    Try PTKD free