Header Logo
  • Solutions

    All-in-One Platform

    Everything you need to manage, grow, and scale - seamlessly in one place.

    Human-Centric AI Integration

    AI designed to enhance your work without replacing the human touch.

    Flexible Customization

    Tailor Smackdab to your business, your way - no compromises.

    Booking & Schedule

    Streamline scheduling and maximize efficiency with smart booking solutions.

    Unlimited Email Marketing

    Send without limits. Smart, scalable, and stress-free campaigns.

    PowerPro Suite

    Elite productivity tools built right into your workflow.

    Because Work Shouldn't Feel Like Work!

  • Industries
  • Comparison
  • About Us
  • Pricing

Bug Bounty Program – Public Disclosures

Last Updated: December 10, 2024

The following is a record of vulnerability reports processed through our Bug Bounty Program. We publish these summaries to provide transparency and help researchers understand what types of findings qualify for rewards.

⚠️ Technical details are intentionally vague to protect our systems and users. Full reproduction details are not disclosed.


🏆 Hall of Fame

We recognize the following researchers for their contributions to Smackdab security:

Researcher Recognition
Researcher C Critical and High severity findings on core application
Researcher D High severity finding on core application
Researcher B Medium and Low severity findings on production infrastructure
Researcher A Low severity findings on marketing website

📋 Processed Reports

# Date Researcher Category System Severity Outcome
010 Dec 2024 Researcher C IDOR Core application Critical $200
008 Dec 2024 Researcher C Authentication Bypass Core application Critical $200
007 Dec 2024 Researcher C Stored XSS Core application High $125
009 Dec 2024 Researcher D Email Change Logic Flaw Core application High $75
005 Dec 2024 Researcher B Information Disclosure Monitoring infrastructure Medium $50
012 Dec 2024 Researcher B Open Redirect / XSS (Grafana) Monitoring infrastructure Medium $50*
001 Dec 2024 Researcher A XML-RPC Configuration Marketing website Low $25*
002 Dec 2024 Researcher A CORS Misconfiguration Marketing website Low *combined
011 Dec 2024 Researcher B Exposed Admin Interface Marketing website Low *combined
003 Dec 2024 Researcher A WordPress Configuration Marketing website Info No bounty
004 Dec 2024 Researcher A WordPress Configuration Marketing website Info No bounty
006 Dec 2024 Researcher B DNS Configuration (CAA) Domain configuration Info No bounty

* Combined bounty paid for multiple related reports


📝 Report Summaries

#010 – IDOR (Critical)

Identified IDOR allowing an attacker to delete any Policy Group across organizations by manipulating a numeric ID in the delete API request. Remediated by implementing proper authorization checks.

#008 – Authentication Bypass (Critical)

Identified 2FA bypass via response manipulation. Remediated as part of authentication system hardening.

#007 – Stored XSS (High)

Identified stored cross-site scripting vulnerability in snippet management feature. Demonstrated session cookie access. Remediated.

#009 – Email Change Logic Flaw (High)

Identified that a user’s email address could be changed without re-entering the current password, enabling potential account takeover via session hijacking. Remediated by adding re-authentication check.

#005 – Information Disclosure (Medium)

Identified unauthenticated Prometheus metrics endpoints exposing internal infrastructure details. No credentials or customer data exposed. Remediated.

#012 – Open Redirect / XSS (Medium)

Identified vulnerability in internal Grafana instances (CVE-2025-4123) that could lead to arbitrary JavaScript execution and session hijacking for targeted DevOps team members. Remediated by upgrading.

#001 & #002 – XML-RPC & CORS (Low)

Reported XML-RPC endpoint and permissive CORS configuration on marketing site. Limited impact due to no customer data on affected system. Combined bounty awarded.

#011 – Exposed Admin Interface (Low)

Reported phpMyAdmin setup wizard was publicly exposed. Classified as Low severity due to affecting the marketing website. Remediated.


🚫 Declined Report Categories

For transparency, the following report types have been submitted and declined under our program terms:

Category Reason Terms Reference
WordPress default configurations Hardening suggestions without exploitability Section 2.3
DNS record recommendations No demonstrated exploitation path Section 2.3
Known CVEs on marketing site Known-issue category Section 2.4
Performance/availability suggestions Not security vulnerabilities Section 2.3

For questions about this page or our Bug Bounty Program, contact: [email protected]

Solutions
  • All-in-One Platform
  • Human-Centric AI Integration
  • Flexible Customization
  • Wellness, Growth & Gamification
  • Power Productivity Suite
  • Industries
  • Comparison
  • About us
  • Pricing
Help
  • Terms of Service
  • Privacy Policy
  • SMACKDAB LIMITED USE DISCLOSURE
  • Register for Webinar

© 2026 Smackdab