Wildberries is an international e-commerce and logistics platform. Since 2003, it has been developing a convenient site with a wide range of products and additional services, including fintech, travel, and digital distribution. The platform assists entrepreneurs in Russia and abroad in growing their businesses and finding customers. Every day, 270,000 Wildberries employees work to deliver over 10 million orders to their clients.
Program description
Welcome to the Wildberries Bug Bounty Program! If you have information about security vulnerabilities in our products, please report it to us following the rules listed below. We greatly appreciate those who uncover vulnerabilities in Wildberries' systems and helps us improve our security.

General rules

Participants are required to maintain confidentiality regarding vulnerability information. Disclosure of this information is only permitted with prior agreement from Wildberries.
The following individuals are not allowed to participate:
  • Wildberries employees
  • Employees of partner companies
 

Scope

Vulnerabilities in the following resources can be reported: *.wildberries.ru, *.wb.ru, *.paywb.com, *.paywb.ru, *.wb-bank.ru, *.wbwh.ru, *.wbbasket.ru, *.wbwh.tech, *.wbheld.ru. The payout amount is determined by the criticality of the resource, as outlined in the classification below.
Tier 1
ResourceLinksDescription
Marketplace1. Web - www.wildberries.ru, global.wildberries.ru
2. iOS - https://apps.apple.com/ru/app/wildberries/id597880187
3. Android - https://play.google.com/store/apps/details?id=com.wildberries.ru
An online store where users can choose, select, and purchase products
Seller Portal1. Web - seller.wildberries.ru, cmp.wildberries.ru
2. Public API - domains, endpoints can be found on https://openapi.wb.ru/
3. iOS - https://apps.apple.com/ru/app/wb-partners/id1661093227
4. Android - https://play.google.com/store/apps/details?id=wb.partners&hl=ru
A platform for sellers to manage inventory, set pricing, and engage with customers
Payment GatewayWeb - alpha.paywb.com, beta.paywb.comService for payment authorization and processing
Balance Pay1. iOS - https://apps.apple.com/ru/app/balance-pay/id6443484009
2. Android – https://play.google.com/store/apps/details?id=ru.wildberries.wbpayclient
An app for managing user balances and digital wallets
Tier 2
ResourceLinksDescription
WB BankWeb - wb-bank.ruA service providing banking solutions for customers, sellers, and franchisees
"Vsem Rabota" PortalWeb - executors.vsemrabota.ruA platform for self-employed individuals to accept tasks from the company and its partners
WB SuppliersWeb - ssp.wildberries.ruA service for suppliers to manage documents and access various tools
WB DigitalWeb - digital.wildberries.ruAn online store for buying and selling digital goods
Call CenterWeb - callcenter.wildberries.ru, сallcenter.wb.ru, portal-cc.wildberries.ruSupport portal for interacting with users
WB TeamWeb - team.wb.ruAn app designed for company employees
WB Рядом1. IOS - https://apps.apple.com/ru/app/wb-%D1%80%D1%8F%D0%B4%D0%BE%D0%BC/id6467810106?l=en-GB
2. Android - https://play.google.com/store/apps/details?id=ru.wildberries.wbcityshopping&pcampaignid=web_share
An app for receiving discounts and cashback at partner retail locations
Tier 3
ResourceLinksDescription
**.wildberries.ru, *.wb.ru, *.paywb.com, *.paywb.ru, *.wb-bank.ru, *.wbwh.ru, *.wbbasket.ru, *.wbwh.tech, *.wbheld.ruEverything else not included in Tier 1 and Tier 2
Exclusions
The scope of resources for testing does not include a number of white-label services, such as:
To confirm that a resource belongs to Wildberries, check if its IP address falls within the following ASNs:
  • AS49053
  • AS57073
  • AS201513
  • AS201512

Special Test Scenarios

Within the program, there's a special scenario for the seller's portal that offers a maximum payout of 500 000 rubles.
It is proposed to gain full access to the personal account of the test seller https://www.wildberries.ru/seller/3941172 with the phone number +7 (993) 965-09-70.
Criteria for completion:
  • Full access without any restrictions to the functionality of the test seller's personal account
  • Detailed description of the reproduction steps with the provision of a flag from an unpublished product card ("products" - "product cards" - "product with the tag flag")
  • Demonstration of deleting an existing product card (https://www.wildberries.ru/catalog/190622575/detail.aspx)

Testing Rules

  1. Only use your own accounts or accounts of users who have explicitly agreed to such actions for the purpose of participating in the program.
  2. Access to third-party accounts or any confidential information is prohibited.
  3. Any activity that may harm Wildberries services, its infrastructure, clients, or partners is prohibited. Prohibited activities include, but are not limited to, social engineering, phishing, denial-of-service attacks, and physical damage to the infrastructure.
  4. To confirm the presence of a vulnerability, use the minimum possible proof of concept (POC). If it may affect other users or system functionality, participants must contact Wildberries for permission. Further exploitation of the vulnerabilities is strictly prohibited.
  5. Automatic scanning should be limited to 10 requests per second

Program Exclusions

We only accept reports that contain information about real security issues. Below are examples of exceptions to our program that are not considered valid vulnerabilities.
General Exclusions:
  • Non-security issues
  • Unlikely or theoretical attacks without proof of feasibility
  • Disclosure of public user information
  • Use of outdated or potentially vulnerable software
  • Phishing, social engineering, and scenarios requiring physical access to the victim
  • Disclosure of technical or non-sensitive information (e.g., product version or software used)
  • Scanner output or scanner-generated reports, including any automated or active exploit tool
  • Ability to upload malicious software
Web Application Exclusions:
  • Self XSS
  • XSS and HTML injections on wbbasket.ru subdomains
  • Vulnerabilities affecting only users of outdated browser versions
  • CSRF for non-critical actions
  • Clickjacking
  • Open Redirect without an additional attack vector (e.g., authorization token theft)
  • Publicly accessible metrics (e.g., prometheus and pprof)
  • Disclosure of API keys intended for client use (e.g., dadata, Yandex maps)
  • Lack of recommended protection mechanisms (e.g., HTTP security headers, cookie security flags, or CSRF protection)
  • Insecurely configured TLS or SSL
  • Lack of metadata cleaning in saved files
  • SSRF with DNS request only
  • DOS attacks
  • User Enumeration attacks
  • Spam through email or PUSH notifications
  • Bypassing brute-force protection mechanisms (e.g., IP address rotation, captcha recognition)
  • Access to test accounts without privileges
Mobile Application Exclusions:
  • Reverse engineering of mobile applications
  • Lack of response from the mobile app on devices with root permissions or jailbreak
  • Lack of SSL pinning of certificates or keys
  • Lack of protective flags in native libraries
  • Vulnerabilities requiring the presence of malicious software, root permissions, or jailbreak on the device
  • Attacks requiring MITM of someone else's connection or physical proximity to another person's device (e.g., attacks via NFC, Bluetooth, or Wi-Fi)

Report Requirements

The report should contain a description of one vulnerability or a chain of related vulnerabilities and should include:
  • Description of the vulnerability
  • Steps to reproduce
  • Severity analysis
The report should also include:
  • List of URLs and affected parameters
  • Vulnerability type
  • Screenshots or videos confirming the presence of the vulnerability and demonstrating the reproduction steps
Failure to meet the minimum requirements may result in a reduction in the reward amount.If a report lacks sufficient data to verify the existence of a vulnerability, no reward is paid.

Handling Duplicates

We pay rewards only for the first report received (provided it contains all necessary information to reproduce the vulnerability). Any subsequent reports on the same vulnerability are marked as duplicates. Reports containing similar attack vectors may also be considered duplicates if the security team believes that information from one report is sufficient to fix all registered issues. A report could be a duplicate of another researcher's report or the internal security team.
Publicly known 0-day or 1-day vulnerabilities may be considered duplicates if they are known to our team from public sources.

Reward Sizes

Rewards are paid to participants only for discovering previously unknown security issues to the company and complying with all the conditions specified in the program. Below is a table comparing the level of criticality and the reward amount:
SeverityTier 1Tier 2Tier 3
Critical200 000 ₽ - 500 000 ₽100 000 ₽ - 250 000 ₽50 000 ₽ - 125 000 ₽
High60 000 ₽ - 200 000 ₽30 000 ₽ - 100 000 ₽15 000 ₽ - 50 000 ₽
Medium20 000 ₽ - 60 000 ₽10 000 ₽ - 30 000 ₽5 000 ₽ - 15 000 ₽
Low5 000 ₽ - 20 000 ₽5 000 ₽ - 10 000 ₽5 000 ₽ - 5 000 ₽
The reward amount is determined individually by Wildberries in each case, taking into account the criteria outlined in the program and within the specified range.
Launched April 26, 2023
Edited September 30, 08:08
Program format
Vulnerabilities
Reward for vulnerabilities
by severity level
Critical
₽200K–500K
High
₽60K–200K
Medium
₽20K–60K
Low
₽5K–20K
None
₽0–0
Top hackers
Overall ranking
Score
Program statistics
₽5,759,500
Paid in total
₽17,667
Average payment
₽528,500
Paid in the last 90 days
662
Valid reports
709
Submitted reports
Description
Vulnerabilities
Ranking
Versions