The program is limited to the web and mobile versions of the Xsolla website. Our profiles on Facebook, Twitter, LinkedIn, Reddit, etc. and our partners’ websites, do not qualify.
Eligible for bounty:
*.xsolla.com (accelerator.xsolla.com excluded)
80.lv
story3.com
golightstream.com (rainmaker.gg excluded)
api.stream
| VULNERABILITY | SEVERITY RANGE |
|---|---|
| Remote Code Execution | Critical |
| SQL Injection | High - Critical |
| XXE | High - Critical |
| Stored XSS | Medium - High |
| Server-Side Request Forgery | High - Critical |
| Directory Traversal - Local File Inclusion | High |
| Authentication/Authorization Bypass (Broken Access Control) | Medium - High |
| Insecure Direct Object Reference | Medium - High |
| Reflected Cross Site Scripting | Medium |
| Misconfiguration | Low - High |
| Web Cache Deception | Low - Medium |
| CORS Misconfiguration | Low - Medium |
| CRLF Injection | Low - Medium |
| Cross Site Request Forgery | Low - Medium |
| Open Redirect | Low - Medium |
| Information Disclosure | Low - Medium |
| Privilege Escalation | Medium - High |
By submitting a bug report, you agree to comply with the Xsolla Bounty Program Policy, which prohibits both public and private disclosure of any vulnerability or bug details related to Xsolla.
By participating in this program, you agree to adhere to the above rules and conditions. All rules must be followed to be eligible for rewards.
To enhance the security of submitted reports, we NO Longer accept Proof-of-Concept materials provided via external links (such as YouTube, Google Drive, Streamlabs), as this may be considered a violation of the Program’s Rules.
Please upload videos\screenshots\pictures directly through the submission form. At this time, POC files must NOT exceed 25MB in size and 7 minutes in duration. You are welcome to shorten or compress the files as needed to meet these requirements.