Western Union

  • $100 – $5,000 per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

398 vulnerabilities rewarded

Validation within 3 days
75% of submissions are accepted or rejected within 3 days

$190 average payout (last 3 months)

Latest hall of famers

Recently joined this program

1620 total


Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

Western Union is a financial services and communications company based in the United States.

In general, Western Union adheres to the Bugcrowd Vulnerability Rating Taxonomy for the prioritization of findings, but they do reserve the right to alter priority on a case-by-case basis. Any submission where the priority is altered will be accompanied by an explanation from the Western Union team.

Note on special domains: The following transaction/core domains below will have higher rewards due to their sensitivity:

  • https://www.westernunion.com
  • https://ebanking.westernunionbank.com
  • payee.globalpay.westernunion.com
  • partnernet.westernunion.com


In scope

Target name Type
https://www.westernunion.com Other
https://www2.westernunion.com Other
https://www.westernunion.fr Other
https://www.westernunion.de Other
https://www.westernunion.no Other
https://www.westernunion.se Other
https://www.westernunion.ca Other
https://www.westernunion.nl Other
https://www.westernunion.es Other
https://www.westernunion.ie Other
https://www.westernunion.ch Other
https://www.westernunion.pt Other
https://www.westernunion.be Other
https://www.westernunion.dk Other
https://www.westernunion.fi Other
https://www.westernunion.pl Other
https://www.westernunion.ee Other
https://www.westernunion.lu Other
https://www.westernunion.gr Other
https://www.westernunion.at Other
https://www.westernunion.it Other
https://www.westernunion.co.nz Other
https://www.westernunion.co.uk Other
https://www.westernunion.com.au Other
https://cuba.westernunion.com Other
https://egypt.westernunion.com Other
https://hk.westernunion.com Other
https://india.westernunion.com Other
https://jamaica.westernunion.com Other
https://locations.westernunion.com Other
https://m.westernunion.com Other
https://senegal.westernunion.com Other
https://sg.westernunion.com Other
https://wuagentportal.westernunion.com Website Testing
https://agentportal.westernunion.com Website Testing
https://westernunionbank.com Website Testing
https://ebanking.westernunionbank.com Website Testing
https://auth.globalpay.westernunion.com Website Testing
http://globalpay.westernunion.com Website Testing
payee.globalpay.westernunion.com Website Testing
https://gpfi.globalpay.westernunion.com Website Testing
transvision.westernunion.com Website Testing
partnernet.westernunion.com Website Testing
iwgo.westernunion.com Website Testing
https://business.westernunion.com/ Website Testing
http://agenttraining.westernunion.com Website Testing
https://paymentstatus.westernunion.com Website Testing
https://foundation.westernunion.com Website Testing
https://partners.westernunion.com Website Testing
wucare.westernunion.com Website Testing
secure.westernunion.com Website Testing
corporate.westernunion.com Website Testing
https://onlinefx.westernunion.com/ Website Testing
https://online.westernunion.com/mp.en/pages/loginform.aspx Website Testing
Western Union iOS app (link below) iOS
Western Union Android app (link below) Android
www.wuedge.com Website Testing
trackpayments.westernunion.com Website Testing
masspay.api.westernunion.com Website Testing
wuinsights.westernunion.com Website Testing
remoteaccess.westernunion.com Website Testing
secureauth.westernunion.com Website Testing

Out of scope

Target name Type
payments.westernunion.com Website Testing
Any asset not listed above as 'In Scope' Website Testing
www.wuprepaid.de Website Testing
https://rewardcircle.westernunion.com Website Testing
https://www.wuprepaid.at/ Website Testing

Any domain/property of Western Union not listed in the targets section is out of scope. This includes any/all subdomains not listed above. If you happen to find an issue on a domain/property that is not listed above, please submit it to our kudos program: Here

For this program, researchers are invited to test the production builds of the Western Union mobile app, both for Android and iOS, as well as the applicable API calls utilized by these applications. Researchers are free to self-provision accounts as needed - however, it's important to note that no testing credit cards or refunds for purchases can or will be provided by Western Union at this time - please be aware of this and either immediately cancel any orders, or only transfer small denominations of currency.


The production build of the iOS app can be downloaded here
The production build of the Android app can be downloaded here
API documentation (or at least a list of endpoints utilized by the mobile apps) is available here
Please note that @bugcrowdninja.com email addresses may not work when registering for an account. In the case of this program, feel free to use your testing gmail, or whatever is most expedient for your testing purposes.

Additional Information/Rules of Engagement:

  • Assets in the scope above are variations on a core web application handling all requests, as such, security issues reproduced in one domain will be reproducible in other domains, making them a single core issue and only worth a single reward.
  • Submissions of a P1-P2 rating must include a working attack scenario to be eligible for a reward. etc/passwd instead of web.inf for example.


11/4/19 - Speedpay domains are now out-of-scope. All things related to SpeedPay are no longer owned by Western Union.

10/5/18 - JSON, JS and CSS will not be rewarded or marked as out of scope. Reflected XSS will be marked as p4 and stored XSS as P3.

5/24/18 - both www.speedpay.com payments.westernunion.com are now in-scope targets for the program.

7/10/18 - wuagentportal.westernunion.com, agentportal.westernunion.com, and paynow7.speedpay.com are now in-scope targets for the program.

Focus Areas:

  • Send Money / Track Transfer pages
  • We are most interested in vulnerabilities on our core platform and infrastructure
  • Ability to remotely gain access to other user's PCI Details (Credit card, CVV, etc)
  • Ability to remotely gain access to other user's PII Details (First name, last name ,payment information’s , etc)
  • Remote Code Execution
  • Significant Authentication Bypass
  • Exfiltration of Sensitive Data or PII or PCI or MTCN
  • Remote Unauthorized Access to full WU database

Out of Scope

  • Do not perform DoS or DDoS attacks.
  • Do not in any way attack our end users, or engage in the trade of stolen/breached user credentials.
  • Do NOT conduct non-technical attacks such as social engineering, phishing or unauthorized access to Infrastructure.
  • Do NOT use automated scanners and tools.

The following finding types are specifically excluded from the bounty:

  • 3rd Party Clients (e.g. WordPress). If you are unsure whether or not a client is 3rd party, please check with us.
  • Re-posting of vendor notices for platform updates
  • Descriptive error messages (e.g. Stack Traces, application or server errors).
  • Login Page / Forgot Password Page Account Brute force or account lockout not enforced.
  • HTTP 404 codes/pages or other HTTP non-200 codes/pages.
  • Banner disclosure on common/public services.
  • Disclosure of known public files or directories, (e.g. robots.txt).
  • Clickjacking and issues only exploitable through clickjacking.
  • Self-XSS and issues exploitable only through Self-XSS.
  • CSRF on forms that are available to anonymous users (e.g. the contact form).
  • Logout Cross-Site Request Forgery (logout CSRF).
  • Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
  • Findings derived from SSL settings (e.g. BREACH attack, insecure SSL ciphers enabled).
  • Lack of Secure and HTTPOnly cookie flags.
  • Lack of Security Speedbump when leaving the site.
  • Username Enumeration
  • Visible Detailed Error/Debug Page - Detailed Server Configuration

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.