This is the official vulnerability disclosure program for WP Rocket. If you're a security researcher and believe that you have found a security vulnerability within our software, please send us details through the "report" form on this page. Please include as detailed information as possible, so we could verify the issue and get back to you as soon as possible with either additional questions or with a potential fix. All valid security vulnerabilities will receive a CVE and may also earn you rewards from Patchstack Alliance bug bounty program.
Patchstack pays a fixed bounty for high value vulnerabilities.
$2,000 Unauthenticated access leading to a full site compromise
$1,500 Subscriber or Customer level access leading to a full site compromise
Members of the Bug Bounty program receive XP for their reports and are eligible for monthly cash rewards.
$1,000 Top ranking contributor
$700 Contributor ranking 2nd
$400 Contributor ranking 3rd
$300 Contributor ranking 4th
$250 Contributor ranking 5th
$200 Contributors ranking 6th to 10th
$100 Contributors ranking 11th to 15th
$50 One lucky pick
No active bounties by the developer
We would like to thank everyone who submits valid reports that help us improve the security of WP Rocket. However, only those that meet the following eligibility requirements may receive a monetary reward for vulnerabilities found in the WP Rocket source code.
You must be the first reporter of a vulnerability.
The vulnerability must be a qualifying vulnerability (see below).
Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through patchstack.com.
You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit your requests per second). If you over do it, your IP address might be throttled or even (temporarily) blocked to protect our infrastructure. See how.
Reports on vulnerabilities are examined by our security analysts - our analysis is always based on worst case exploitation & the business criticality of the vulnerability, as is the reward we pay.
Cross Site Scripting (XSS)
Remote/Local File Inclusion
Cross-Site Request Forgery (CSRF)
Broken Access Control
Arbitrary File Read/Download/Upload/Deletion
Sensitive Data Exposure
Arbitrary/Remote Code Execution
Server Side Request Forgery (SSRF)
Denial of Service
PHP Object Injection
Deserialization of untrusted data
Insecure Direct Object References (IDOR)
Cross-Site Request Forgery (CSRF) on read-only actions
Pre-requisite of another vulnerability
Pre-requisite of specific or unusual conditions
Vulnerabilities that requires exotic server configurations or outdated server software
Missing encryption/hashing on potential sensitive information
Spoofing of data (User Agent, IP address, etc.) with no serious security impact
Members of the Patchstack Bug Bounty program are ellegible for monthly cash rewards.
Additional bounties can be paid out to Patchstack Bug Bounty members for findings that are beneficial to the community, particularly interesting or hard to find. Please read our full guidelines and terms before reporting.