Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
530,786 coordinated disclosures
286,810 fixed vulnerabilities
731 bug bounties with 1,446 websites
14,847 researchers, 1070 honor badges

Drupal Bug Bounty Program

Drupal runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Drupal

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Drupal and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

drupal.org

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Please refer to https://www.drupal.org/drupalorg/docs/build/drupalorg-bug-bounty-program for details of our program.

Testing Requirements:

Vulnerabilities should be verified as authentic, and not simply automated results of pen-tests.

Possible Awards:

At this time, the Drupal Association does not have any active reward program for reported vulnerabilities.

Special Notes:

We prefer that you contact us through: https://www.drupal.org/drupalorg/docs/build/drupalorg-bug-bounty-program rather than through the OpenBugBounty platform

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 29.03.2020 gir.am
 28.03.2020 shorturl.at
 28.03.2020 degruyter.com
 28.03.2020 letmejerk3.com
 28.03.2020 vanityfair.com
 28.03.2020 team1x1.com
 28.03.2020 extrabux.com
 28.03.2020 seguradoralider.com.br
 28.03.2020 link-assistant.com
 28.03.2020 calculator.net

  Latest Blog Posts

12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List

  Recent Recommendations

    27 March, 2020
     hstead:
Very rapid communication and detailed instructions as to how to fix the issue. Thanks for the assistance.
    27 March, 2020
     PaulMar23292621:
r00tpgp reported a serious issue to us and helped us with reproducing the issue and pushing towards a fix for the problem.
Thank you very much for the great work!
    27 March, 2020
     Michael3277:
Thanks for your report. With your help we could find the bug and make our Website safer!

roker is a friendly Security Resercher who is answering very fast to mails!
    26 March, 2020
     KyleGeorgeArch:
Thank you ElProfesor for responsibly disclosing an XSS issue and providing the reproduction steps. With your help we've identified the issue and are working on a fix. Thank you for your hard work and responsible practices.
    25 March, 2020
     KyleGeorgeArch:
ianf0ns3c identified an XSS issue and provided the reproduction steps in a polite and timely manner, giving us all the information we needed to investigate and take it to our developers. We're grateful for his work on the matter.