The program is limited to the web and mobile versions of the Xsolla website. Our profiles on Facebook, Twitter, LinkedIn, Reddit, etc. and our partners’ websites, do not qualify.
Eligible for bounty:
*.xsolla.com
80.lv
story3.com
golightstream.com (rainmaker.gg excluded)
api.stream
VULNERABILITY | SEVERITY RANGE |
---|---|
Remote Code Execution | Critical |
SQL Injection | High - Critical |
XXE | High - Critical |
Stored XSS | Medium - High |
Server-Side Request Forgery | High - Critical |
Directory Traversal - Local File Inclusion | High |
Authentication/Authorization Bypass (Broken Access Control) | Medium - High |
Privilege Escalation | Medium - High |
Insecure Direct Object Reference | Medium - High |
Reflected Cross Site Scripting | Medium |
Misconfiguration | Low - High |
Web Cache Deception | Low - Medium |
CORS Misconfiguration | Low - Medium |
CRLF Injection | Low - Medium |
Cross Site Request Forgery | Low - Medium |
Open Redirect | Low - Medium |
Information Disclosure | Low - Medium |
By submitting a bug report you agree to comply with the Xsolla Bounty Program Policy, which forbids public or private disclosure of the details of any vulnerability or bug on Xsolla before the 30 days after the bug has been fixed.
By participating in this program, you agree to adhere to the above rules and conditions. All rules must be followed to be eligible for rewards.