Banner object (1)

Hack and Take the Cash !

790 bounties in database
  Back Link to program      
Upwork logo
Hall of Fame


100 $ 

In Scope

Scope Type Scope Name
ios_application Upwork - iOS and Android Applications
web_application *
web_application Upwork Dash Messanger Desktop Version (

Out of Scope

Scope Type Scope Name
other Any subdomain/domain/property not listed in the 'in scope' section, is out of scope.
web_application (Any vuln related to a support ticket)
web_application Any Third-party Services



For this program, we're inviting researchers to test our freelancer platform and mobile iOS/Android/Desktop apps. Our goal with this program is to ensure that our customers are using a secure platform that's free of security vulnerabilities.


User Agent

To participate in the Upwork Bug Bounty please configure your scanner to includebugcrowd in the user-agent string. Failure to do so may result in your IP being temporarily blocked from participation in the program.

Upwork Account

Please email address for all platform testing. Failure to do so may result in your Account being temporarily locked from participation in the program.

Please also note: Upwork regularly releases new code. In the event you don't find anything today, there may be something present tomorrow. This is a great opportunity for Upwork and the researcher community to work together to find vulnerabilities! Watch for new releases on Upwork's Blog.


For the initial prioritization/rating of findings (with a few exceptions), this program will use the Bugcrowd Vulnerability Rating Taxonomy.

However, it is important to note that in some cases, a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal and make a case for a higher priority.

Please see Target Information for exclusions specific to this program.


Priority | iOS, Android | Web, Desktop, API
P1 | $5,000 | $2,000
P2 | $2,000 | $1,200
P3 | $600 | $400
P4 | $250 | $100

Special Web-Based High Impact Reward

In addition to the regular rewards for this program, Upwork is also offering a one-time $5,000 reward for the ability to break into any of the specified client or freelancer accounts and steal the funds allocated to it. The account is: and


  • Please provide complete reproduction steps for how you were able to capture the flag
  • Bruteforcing credentials to break in is still out of scope as per the regular scoping rules.

Momentum Bonus! (The more you submit, the more you earn)

There is a 7-day sliding window where you can build momentum on your rewards for the Upwork program. Every accepted bug submitted during this window will earn you a 10% increase on your payout.

For example, if you submit three valid bugs in a week, payouts will be as following:

  • Bug #1→100% of the standard reward
  • Bug #2→110% of the standard reward
  • Bug #3→120% of the standard reward

the maximum amount you can increase your payout to is 200% (double reward)


In scope

Target name | Type
* | Other
Upwork - iOS and Android Applications | Other
Upwork Dash Messanger Desktop Version ( | Other | API

Out of scope

Target name | Type
---|--- | Website (Any vuln related to a support ticket) | Website
Any subdomain/domain/property not listed in the 'in scope' section, is out of scope. | Other
Any Third-party Services | Website

Any domain/property of Upwork not listed in the targets section is out of scope. This includes any/all subdomains not listed above.

Target information

  • Please note that the mobile web app is available at:
  • Information on the public messaging API is available at: and also attached to the listing.
  • To view a list of what will likely be the best areas to focus on to find valid and unique findings, please go here

Upwork - iOS and Android Applications

API Documentation


Please sign up for an Upwork account and Upwork API using your email address.

When testing please only test against jobs that you have created - do not test against jobs owned by persons other than yourself


  • All CSRF vulnerabilities will likely be evaluated at P4 level
  • Social Engineering
  • Uploading of any vulnerability or client-related content to third-party utilities (e.g. Github, DropBox)
  • Network-layer D/DoS (If you suspect an application-layer D/DoS, contact Bugcrowd to review the vulnerability. Do not proof-of-concept application-layer D/DoS attacks without prior consent)
  • All attack payload data must use professional language (ex: “test” rather than “this has been hacked.”)
  • If able to gain access to a system, accounts, users, or user data, stop at the recognition of and report. Do not dive deeper to determine how much more is accessible.

Additionally, the following vulnerabilities are considered too low of an impact, and will be marked as Out of Scope if submitted


  • Account/e-mail enumeration using brute-force attacks
  • Any low impact issues related to session management (i.e. concurrent sessions, session expiration, password reset/change logout, etc.)
  • Bypassing content restrictions in uploading a file without proving the file was received
  • Clickjacking/UI redressing
  • Incomplete or missing SPF/DMARC/DKIM records
  • Issues related to password/credential strength, length, lock outs, or lack of brute-force/rate limiting protections
  • Lack of SSL or Mixed content
  • Missing Cookie flags
  • Reflected file download attacks (RFD)
  • Self-exploitation (i.e. password reset links or cookie reuse)
  • URL Redirection
  • Use of a known-vulnerable library which leads to a low-impact vulnerability (i.e. jQuery outdated version leads to low impact XSS)
  • Vulnerabilities affecting users of outdated browsers, plugins or platforms
  • Vulnerabilities that allow for the injection of arbitrary text without allowing for hyperlinks, HTML, or JavaScript code to be injected
  • Vulnerabilities that require the user/victim to perform extremely unlikely actions (i.e. Self-XSS)


  • android:debuggable=”true” in Android Manifest
  • android:allowBackup set to true (by default)
  • Information disclosure via Toast messages


  • Information leakage in backgrounding snapshots
  • Information leakage in keystroke caching


  • Copy & Paste disabled for sensitive fields
  • Pasteboard data cached
  • The application asks for more permission than its needs
  • Two-factor authentication bypass that requires physical access to a logged-in device
  • Any issue in the mobile app that can only be exploited on a rooted or jailbroken device
  • Any issue exploited in the mobile app because an operating system vulnerability
  • Local access to user data when operating a rooted mobile device

This list will be updated if we see a particular vuln that is systemic and site wide. Please check this list often. This is for your benefit and to save you the trouble of searching the analytics

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

FireBounty © 2015-2019

Legal notices