Mailgun empowers developers by allowing them to easily integrate email into their applications. With our powerful API, users can build apps that send, receive, and track emails in real time using a combination of standard protocols. We work hard to keep Mailgun high performing and secure for our user community. Help us make our products even better and earn rewards by reporting potential vulnerabilities.
For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
Please note that all leaked API keys found on Github will be categorized as a P3.
Reward RangeLast updated
|Technical severity||Reward range|
|p1 Critical||$1,000 - $1,500|
|p2 Severe||$600 - $1,000|
|p3 Moderate||$200 - $600|
|p4 Low||$100 - $200|
Out of scope
Any domain/property of Mailgun not listed in the targets section is out of scope. This includes any/all subdomains not listed above.
For testing purposes, you're free to create your own accounts to do so, please sign up at https://signup.mailgun.com/new/signup with your @bugcrowdninja.com ('email@example.com) email address (for more information regarding your @bugcrowdninja email, please see this doc: https://researcherdocs.bugcrowd.com/docs/your-bugcrowdninja-email-address).
- Privilege escalations based our user roles
- Findings related to Third-Party Services used by Mailgun