Smackdab
  • Proposals
  • Solutions

    All-in-One Platform

    Everything you need to manage, grow, and scale - seamlessly in one place.

    Human-Centric AI Integration

    AI designed to enhance your work without replacing the human touch.

    Flexible Customization

    Tailor Smackdab to your business, your way - no compromises.

    Booking & Schedule

    Streamline scheduling and maximize efficiency with smart booking solutions.

    Unlimited Email Marketing

    Send without limits. Smart, scalable, and stress-free campaigns.

    PowerPro Suite

    Elite productivity tools built right into your workflow.

    Because Work Shouldn't Feel Like Work!

  • Industries
  • Comparison
  • About Us
  • Pricing
← All policies
Legal policy

BUG BOUNTY DISCLOSURES

Read the current Smackdab policy in a cleaner web format, or download the official PDF copy.

Last updated: December 10, 2025 Official PDF 4 sections
Download official policy ↓
!

Official copy

This page is web-formatted for readability. Download the official policy for the formal legal copy.

PDF Official Current
← All policies

Jump to section

  1. 🏆 Hall of Fame
  2. 📋 Processed Reports
  3. 📝 Report Summaries
  4. 🚫 Declined Report Categories

This web version is here to make reading easier. If anything conflicts, the official policy controls.

Official policy available. This page is a web-formatted version for readability. If anything conflicts, the official policy controls. Download PDF

Bug Bounty Program - Public Disclosures

Last Updated: December 10, 2024 The following is a record of vulnerability reports processed through our Bug Bounty Program. We publish these summaries to provide transparency and help researchers understand what types of findings qualify for rewards. ⚠️ Technical details are intentionally vague to protect our systems and users. Full reproduction details are not disclosed.


🏆 Hall of Fame

We recognize the following researchers for their contributions to Smackdab security:

Researcher

Recognition

Researcher C

Critical and High severity findings on core application

Researcher D

High severity finding on core application

Researcher B

Medium and Low severity findings on production infrastructure

Researcher A

Low severity findings on marketing website


📋 Processed Reports

Date

Researcher

Category

System

Severity

Outcome

010

Dec 2024

Researcher C

IDOR

Core application

Critical

$200

008

Dec 2024

Researcher C

Authentication Bypass

Core application

Critical

$200

007

Dec 2024

Researcher C

Stored XSS

Core application

High

$125

009

Dec 2024

Researcher D

Email Change Logic Flaw

Core application

High

$75

005

Dec 2024

Researcher B

Information Disclosure

Monitoring infrastructure

Medium

$50

012

Dec 2024

Researcher B

Open Redirect / XSS (Grafana)

Monitoring infrastructure

Medium

$50*

001

Dec 2024

Researcher A

XML-RPC Configuration

Marketing website

Low

$25*

002

Dec 2024

Researcher A

CORS Misconfiguration

Marketing website

Low

*combined

011

Dec 2024

Researcher B

Exposed Admin Interface

Marketing website

Low

*combined

003

Dec 2024

Researcher A

WordPress Configuration

Marketing website

Info

No bounty

004

Dec 2024

Researcher A

WordPress Configuration

Marketing website

Info

No bounty

006

Dec 2024

Researcher B

DNS Configuration (CAA)

Domain configuration

Info

No bounty

* Combined bounty paid for multiple related reports


📝 Report Summaries

#010 - IDOR (Critical)

Identified IDOR allowing an attacker to delete any Policy Group across organizations by manipulating a numeric ID in the delete API request. Remediated by implementing proper authorization checks.

#008 - Authentication Bypass (Critical)

Identified 2FA bypass via response manipulation. Remediated as part of authentication system hardening.

#007 - Stored XSS (High)

Identified stored cross-site scripting vulnerability in snippet management feature. Demonstrated session cookie access. Remediated.

#009 - Email Change Logic Flaw (High)

Identified that a user’s email address could be changed without re-entering the current password, enabling potential account takeover via session hijacking. Remediated by adding re-authentication check.

#005 - Information Disclosure (Medium)

Identified unauthenticated Prometheus metrics endpoints exposing internal infrastructure details. No credentials or customer data exposed. Remediated.

#012 - Open Redirect / XSS (Medium)

Identified vulnerability in internal Grafana instances (CVE-2025-4123) that could lead to arbitrary JavaScript execution and session hijacking for targeted DevOps team members. Remediated by upgrading.

#001 & #002 - XML-RPC & CORS (Low)

Reported XML-RPC endpoint and permissive CORS configuration on marketing site. Limited impact due to no customer data on affected system. Combined bounty awarded.

#011 - Exposed Admin Interface (Low)

Reported phpMyAdmin setup wizard was publicly exposed. Classified as Low severity due to affecting the marketing website. Remediated.


🚫 Declined Report Categories

For transparency, the following report types have been submitted and declined under our program terms:

Category

Reason

Terms Reference

WordPress default configurations

Hardening suggestions without exploitability

Section 2.3

DNS record recommendations

No demonstrated exploitation path

Section 2.3

Known CVEs on marketing site

Known-issue category

Section 2.4

Performance/availability suggestions

Not security vulnerabilities

Section 2.3


For questions about this page or our Bug Bounty Program, contact: security@smackdab.ai

Smackdab
Solutions
  • All-in-One Platform
  • Human-Centric AI Integration
  • Flexible Customization
  • Wellness, Growth & Gamification
  • Power Productivity Suite
  • Industries
  • Comparison
  • About us
  • Pricing
Help
  • Legal
  • Terms of Service
  • Privacy Policy
  • Smackdab Limited Use Disclosure

© 2026 Smackdab