Web & Mobile

This is a vulnerability classification table for web & mobile applications (v2.0)

We use the Common Vulnerability Scoring System to assess the severity of reported vulnerabilities. Below is a classification of accepted issues and their typical severity ratings.

Severity

Example Vulnerabilities

🔴 Critical

  • Payments manipulation

  • SQL Injection (SQLi)

  • Remote Code Execution (RCE)

  • Business logic flaws causing loss of user funds or assets

  • Command Injection

🟠 High

  • Subdomain takeover (on domains linked to wallets or sensitive assets)

  • Stored Cross-Site Scripting (XSS)

  • Server-Side Request Forgery (SSRF)

  • Leakage of sensitive user information affecting >15% of users

  • File Inclusion vulnerabilities

  • Authentication Bypass: Full or partial bypass of login, session management, or auth tokens.

  • Insecure Direct Object Reference (IDOR): Accessing unauthorized user data/resources.

  • Privilege Escalation (Medium–High): User accessing or performing admin-only functions.

🟡 Medium

  • Reflected Cross-Site Scripting (XSS)

  • Subdomain takeover (non-wallet domains)

  • Two-Factor Authentication (2FA) Bypass

  • Leakage of sensitive user information affecting 3%–15% of users

  • Cross-Site Request Forgery (CSRF)

🟢 Low

  • HTML Injection

  • Subdomain takeovers without business impact (e.g., over a third-party service without access to cookies, auth, or internal APIs).

  • No rate limiting on form submissions or public endpoints

  • Content Spoofing

  • Broken Link Hijacking

Please review the Out-of-Scope Vulnerabilities before submitting.

Last updated