
Chess.com
External Program
Submit bugs directly to this organization
Updated: May 12, 2025, 9:58 AM
[v0.1.6 | Last updated May 12, 2025] This policy covers all payments to third parties for finding and disclosing bugs, vulnerabilities, and exploits within the Chess.com domain and not on other domains and related products. This policy is only guidance for you and Chess.com, and does not represent a contract, promise, or obligation on either party.
Bugs are any feature or function of the site, mobile apps, or API which are not operating as intended. The result may be annoying, misleading, inaccurate, missing, or simply non-functional.
Vulnerabilities are bugs which damage data or expose non-public data about individual members or the company itself, or which allow a person who is not the owner of an account to act as the owner. Vulnerabilities may be minor to severe, and in some cases may require Chess.com to follow formal legal processes. This document helps you, the reporter of a bug, follow guidelines that let us respond properly. We will refer to you as "Reporter" for the rest of this document.
We do not pay a bug bounty for user interface, graphics, or data bugs which do not pose a security threat. However, reporting these bugs through our “Report a Bug” system in the Help menu allows us to regularly award free memberships to Reporters who help us the most.
We pay a bounty for vulnerabilities disclosed according to the procedure described in this policy.
VULNERABILITY TYPE:
# Remote code execution
- Details:
- Any successful proof of code execution on server side including but not limited to:
- File Inclusion leading to potential binary or malware execution
- SQLi
- server-side script execution
- Reverse shell on server
- Bounty:
$1000-4000
# Mass user account data leakage
- Details:
- Obtain many users’ private account data and/or passwords with a single exploit
- Bounty:
$800-3000
# Broken Authentication and Session Management
- Details:
- Any form of Authentication Bypass
- Session Fixation, resulting in gaining access to any/multiple user’s accounts
- 2FA bypass
- Account takeover
- Obtain a target user password
- Bounty:
$600-800
# Server side injection
- Details:
- This category covers any injection that leads to server side actions such as:
- Template injection
- Response splitting CRLF. (Must show impact)
- SSRF with payload showing impact
- Bounty:
up to $400
# CSRF
- Details:
- Damage user settings
- Perform actions on behalf of other users
- (*Excluding actions performed as a result of XSS)
- Bounty:
up to $400
# Application logic bypass
- Details:
- This category covers all vulnerabilities dealing with:
- Bugs in application logic/flow that can result in a security issue
- Broken Access Control (BAC)
- Insecure direct object references (IDOR)
- Bounty:
up to $400
# XSS
- Details:
- **Payouts will be awarded for discovering a new injection vector that enables JavaScript execution.
- Reports will be evaluated based on impact and exploit path, ranging from:
- Basic alert() execution (demonstrates control of JS context)
- Bypassing filters or sanitization
- Loading untrusted scripts or exfiltrating data
- Bounty:
up to $250, depending on severity, impact, and novelty of the vector.
# Content Spoofing
- Details:
- HTML injection leading to believable phishing
- Bounty:
up to $250
# PII Leakage
- Details:
- Obtaining users PII including:
- IP address
- User Geolocation
- Email Address
- Telephone number
- Bounty:
up to $200
# Server Security Misconfiguration
- Details:
- Captcha Bypass
- Bounty:
up to $150
# Server Security Misconfiguration
- Details:
- No Rate Limiting on Critical Forms
- Bounty:
up to $100
# Non-sensitive information leakage
- Details:
- Ex. Login form providing different responses when a username is incorrect vs a password being incorrect,
allowing easier brute force ability
- Bounty:
up to $100
By offering a Bug Bounty, we are asking for helpful advice. You may not attack or cause damage to the site, the users’ data, or the company’s reputation. All efforts must be polite and cause no harm. You must take all reasonable actions to confine the effects of your work to test accounts created specifically for this purpose and avoid experiments visible to the public or during live events. Any unannounced vulnerability investigation indistinguishable from an attack and/or violating the terms of this program will be treated as an attack, and we may involve law enforcement agencies to investigate and prosecute. If you believe your exploit may cause harm, contact us before you attempt it, and we will work with you to devise a safe mechanism for demonstration.
Chess.com will attempt to respond and work with you within 5 business days. Failure to do so does not invalidate your claim; we will get back to you as soon as we can.
Reports from automated tools, exploits on unsupported browsers or old mobile apps, physical-access or social-engineering attacks (including phishing or impersonating staff), denial of service, email, issues relating to systems out of Chess.com’s control, and issues that we are already aware of are not eligible. Deviations from industry standard procedures and settings are not eligible for a bug bounty without a demonstration that the effect can be exploited in specific harmful ways.
During this phase of the bug bounty program, only security issues within the Chess.com domain will be eligible and in scope for bug bounty.
In case we decide to extend the Bug Bounty program to other domains like Chesskid, Chessable or others, we will update this article and make that clear.
To claim a bounty for a vulnerability you have discovered, follow these steps:
If you have any questions or concerns, you may reach out to the email address above. Thank you!