The program is limited to the web and mobile versions of the Xsolla website. Our profiles on Facebook, Twitter, LinkedIn, Reddit, etc. and our partners’ websites, do not qualify.
Eligible for bounty:
*.xsolla.com (accelerator.xsolla.com excluded)
80.lv
story3.com
golightstream.com (rainmaker.gg excluded)
api.stream
VULNERABILITY | SEVERITY RANGE |
---|---|
Remote Code Execution | Critical |
SQL Injection | High - Critical |
XXE | High - Critical |
Stored XSS | Medium - High |
Server-Side Request Forgery | High - Critical |
Directory Traversal - Local File Inclusion | High |
Authentication/Authorization Bypass (Broken Access Control) | Medium - High |
Insecure Direct Object Reference | Medium - High |
Reflected Cross Site Scripting | Medium |
Misconfiguration | Low - High |
Web Cache Deception | Low - Medium |
CORS Misconfiguration | Low - Medium |
CRLF Injection | Low - Medium |
Cross Site Request Forgery | Low - Medium |
Open Redirect | Low - Medium |
Information Disclosure | Low - Medium |
Privilege Escalation | Medium - High |
By submitting a bug report, you agree to comply with the Xsolla Bounty Program Policy, which prohibits both public and private disclosure of any vulnerability or bug details related to Xsolla.
By participating in this program, you agree to adhere to the above rules and conditions. All rules must be followed to be eligible for rewards.