ExpressVPN - Bug Bounty Program
Bounty Range
$50 - $2,500
external program
Bounty Range
$50 - $2,500
external program
BountyHall of fame
$50 Low $200 Medium $600 High $1,250 Critical $2,500
Avg reward -
Max reward -
Scopes30
Supported languagesEnglish
Reports359
1st response < 1 day
Reports last 24h2
Reports last week16
Reports this month33
Program description
Program activity
ExpressVPN operates thousands of VPN servers and makes cross-platform VPN applications for all major desktop and mobile operating systems, as well as routers and browser extensions.
Security is core to our values, and we value the input of hackers acting in good faith to help us maintain a high standard for the security and privacy of our users. This includes encouraging responsible vulnerability research and disclosure. We've offered an in-house bug bounty program for years and paid out thousands of dollars to security researchers in that time. We value excellent engineering and are always looking for ways to improve the security of our products and services.
At ExpressVPN, we’ve devised meticulous cybersecurity controls to keep our systems and users protected from attacks and intrusions. To ensure that our VPN software and systems meet the high standards of privacy and security that we promise to our customers, we rigorously test them in-house and invite auditors to conduct independent reviews.
As part of our external validations, we have a long-running bug bounty program, with which we invite security researchers to test our systems and receive financial rewards for any problems they find. Over the years, we have awarded tens of thousands of dollars to successful bug bounty hunters.
In addition: The first person to find and demonstrate a security-critical bug on our VPN server technology, TrustedServer, will receive a new bonus award of US$100,000.00 which is 10 times the highest reward previously offered (but not claimed) by ExpressVPN.
With this new incentive, we seek to underline our confidence in TrustedServer’s design and our commitment to providing essential privacy protections to users. Do we want someone to win the award? On the one hand, no—because that would confirm the strength of our server security. But we are also deeply invested in discovering any vulnerabilities if they exist and are keen for feedback from the community. We would be thrilled to work with and reward anyone who successfully finds a bug.
To win the one-time $100,000 bonus, you must find and report one of the following issues on our VPN servers:
Unauthorized access to a VPN server or remote code execution
Vulnerabilities that:
Leak the real IP addresses of clients as a result of a vulnerability in our VPN servers
Allow an attacker to monitor user traffic on our VPN servers
The award goes to the first valid submission.
All activities must remain in scope of the TrustedServer platform.
This is: 10x the highest reward previously offered (but not claimed) by ExpressVPN.
Note: In order to qualify to claim this bounty, we will require proof of impact to our user’s privacy. This will require demonstration of unauthorized access, remote code execution, IP address leakage or the ability to monitor unencrypted (non-VPN encrypted) user traffic.
With this new reward, we aim to:
Reaffirm our confidence in TrustedServer’s design
Emphasize our commitment to user privacy
Encourage community participation in improving our security
We strive to ensure that our challenges are on a level playing field. Thus, the following individuals are not eligible to claim the bonus for the first critical finding:
full-time or part-time employees of ExpressVPN or any other subsidiary of Kape Technologies, as well as their friends and family; and
contractors, consultants, representatives, suppliers, vendors, or any other persons related to or otherwise affiliated with ExpressVPN
These are production services that are actively used by ExpressVPN customers and partners.
Included assets:
*.expressvpn.com — Wildcard includes all subdomains and their children.
expressvpn.jobs — recruitment-related integrations
gh-mail.expressvpn.com — Greenhouse ATS integration
These are key backend systems used for authentication, service provisioning, and configuration management.
JWKS key location: https://api.jwks.kape.com/.well-known/jwks.json
Staging API: https://xv-cp.apis-staging.xvtest.net
General API Usage: https://api.expressvpn.com
Base API for other Open API spec endpoints: https://cp.expressapisv2.net
Dedicated IP (DIP) API calls go to the following endpoints:
Reference: You are encouraged to review our OpenAPI spec: https://cdn-yeswehack.com/program/7e43cde1-ee9c-4b64-87b2-112f7034b3fb?expires=1774387752&token=229e80a387a1f0e0abffc28c013261131d8c70a7e1599418eed4609a9a76856d to understand expected behaviors and endpoints.
These extensions allow users to control the VPN from their browsers and integrate password management functionality.
Included assets:
[https://chromewebstore.google.com/detail/expressvpn-vpn-proxy-for/fgddmllnllkalaagkghckoinaemmogpe?pli=1](ExpressVPN Chrome Extension)
[https://addons.mozilla.org/en-US/firefox/addon/expressvpn/](ExpressVPN Firefox Extension)
[https://chromewebstore.google.com/detail/expressvpn-keys-password/blgcbajigpdfohpgcmbbfnphcgifjopc](ExpressVPN Keys Password Manager (Chrome))
These native apps provide core VPN connectivity and account features on mobile devices.
Included assets:
[https://play.google.com/store/apps/details?id=com.expressvpn.vpn&hl=en](ExpressVPN Android Application (Play Store))
[https://apps.apple.com/us/app/expressvpn-ultra-secure-vpn/id886492891](ExpressVPN iOS Application (App Store))
These VPN clients are designed for use on major desktop operating systems.
Included assets:
[https://www.expressvpn.com/latest](ExpressVPN Windows Application)
[https://www.expressvpn.com/latest](ExpressVPN macOS Application)
[https://www.expressvpn.com/latest](ExpressVPN Linux Application)
ExpressVPN’s in-house VPN protocol focused on speed, security, and reliability. It is open source and available in multiple implementations.
Included assets:
[https://github.com/expressvpn/lightway](Lightway (Rust) - GitHub)
[https://github.com/expressvpn/wolfssl-rs](WolfSSL Wrapper (Rust) - Github)
ExpressVPN operates a global fleet of VPN servers that users connect to from various devices.
Important notes:
Full list of servers is not publicly available.
A subset is visible through ExpressVPN applications — only these are in-scope.
Brute-forcing, scanning the entire IP space, or disrupting VPN infrastructure is strictly prohibited.
We welcome responsible testing of endpoints exposed via the official apps that reflect real-world usage.
For any submissions related to our VPN servers, please include a screenshot of the VPN application clearly showing the assigned IP address and location used during testing.
Failure to provide this evidence may result in the report being closed or marked as incomplete.
Aircove is ExpressVPN’s custom VPN router with always-on protection and built-in VPN functionality.
This is the domain for ExpressVPN's and Kape's engineering tools, CI/CD environments, and staging services.
Important notes:
This currently acts primarly as a mail relay - this means spoofing is currently possible, and will not be reward.
Please focus on web application and mail relay related vulnerabilities.
These domains are used for IT infrastructure, identity services, and deployment workflows.
Key subdomains:
1pw-scim.prd.iat.it.xvservice.net: SCIM for 1Password
gatekeeper.prd.iat.it.xvservice.net: Legacy IAA service
prd.iat.it.xvservice.net, vector.prd.iat.it.xvservice.net: Production identity management
it.xvservice.net: VMware and IT systems
*.polymoon.it, corp.polymoon.it: GlobalProtect, SaaS tools
networkguard.com: Redirects, web integrations
Please adhere to the following rules while performing research on this program:
Denial of service (DoS) attacks on ExpressVPN applications, servers, networks or infrastructure are strictly forbidden.
Avoid tests that could cause degradation or interruption of our services.
Do not use automated scanners or tools that generate large amount of network traffic.
Do not leak, copy, manipulate, or destroy any user data or files in any of our applications/servers.
No vulnerability disclosure, full, partial or otherwise, is allowed.
Make sure to apply hunting requirements policy (User-Agent, VPN, etc.)
In the context of this program, we do not intend to encourage, accept or reward reports of credential exposures that are not applicable to our program’s scope and identified outside of our program’s scope, such as:
Exposed credentials in/from an out-of-scope asset/source
Sensitive information exposed in/from an out-of-scope asset/source
To avoid encouraging dark and grey economies (e.g. credential trading, social engineering), we will not accept any report based on information not originating from a failure on our part or that of our service providers.
This includes (but is not limited to):
Stolen credentials gathered from unidentified sources
Credentials not applicable and not found in the in-scope assets
Exposed secrets unrelated to program scope
PII exposed on out-of-scope assets
| Source of credential exposure is in-scope | Belongs to ExpressVPN, out-of-scope | Not ExpressVPN-owned, out-of-scope |
Impact is in-scope | ✅ Eligible | ✅ Eligible | ❌ Not Eligible |
Impact is out-of-scope | ✅ Eligible | ❌ Not Eligible | ❌ Not Eligible |
As a complement to the Program’s rules and testing policy:
DO NOT alter compromised accounts by creating, deleting or modifying any data.
DO NOT use compromised accounts to search for post-auth vulnerabilities (they won’t be eligible anyway).
DO NOT include Personally Identifiable Information (PII) in your report. REDACT/OBFUSCATE all PII in screenshots or payloads.
In case of exposed credentials or secrets, limit yourself to verifying the credentials' validity.
In case of sensitive information leaks, DO NOT extract/copy all data. Only describe and list what's visible.
We are happy to thank everyone who submits valid reports which help us improve the security of ExpressVPN. However, only those that meet the following eligibility requirements may receive a monetary reward:
You must be the first reporter of a vulnerability.
The vulnerability must be a qualifying vulnerability.
The report must contain:
Clear textual description of the vulnerability
Security impact on users and systems
Remediation suggestions
Proof of exploitation (screenshots, evidence)
Reproduction steps (payloads, code, commands)
You must comply with all testing policy rules.
You must not be a current or former employee or contractor of ExpressVPN.
Reward amounts depend on:
Reward grid of the relevant scope
CVSS score and risk impact analysis
Asset value | CVSS Low | CVSS Medium | CVSS High | CVSS Critical | High | $200 | $600 | $1,250 | $2,500 |
Scope | Type | Asset value | Expand rewards grid | *.expressvpn.com | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| app.expressmailguard.com | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| expressvpn.jobs | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| ExpressVPN APIs | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://xv-cp.apis-staging.xvtest.net/ | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://cp.expressapisv2.net | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.expressvpn.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.enc.kape.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.dbs.kape.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.dts.kape.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.blts.kape.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.pcrs.kape.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://api.jwks.kape.com | API | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| ExpressVPN VPN servers | Other | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| ExpressVPN Router | Other | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| *.xvtest.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| *.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| it.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| 1pw-scim.prd.iat.it.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| gatekeeper.prd.iat.it.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| iat.it.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| prd.iat.it.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| vector.prd.iat.it.xvservice.net | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| gh-mail.expressvpn.com | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| *.polymoon.it | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| corp.polymoon.it | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| networkguard.com | Web application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| Any Applications under https://www.expressvpn.com/latest | Application | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| https://github.com/expressvpn/lightway | Other | High | | Low $200
Medium $600
High $1,250
Critical $2,500
| TrustedServer 100,000 Bonus Award (See Program Policy for Info) | Other | High | | Low $200
Medium $600
High $1,250
Critical $2,500
|
You may create ExpressVPN accounts by signing up to a 7-day free trial by signing up with our Android or iOS applications. Alternatively, you can sign up for a regular account and make use of our 30-day money-back guarantee here https://www.expressvpn.com/order.
Please use your YesWeHack email aliases which are [https://yeswehack.com/user/my-yeswehack/email-alias](available here) for account creation.
The use of a personal account is authorized if you have one.
Please note: Some in-scope assets may only be accessible to authorized or authenticated users. No additional credentials or privileged access will be provided as part of this program. Researchers are expected to focus on unauthenticated attack surfaces or responsibly identify authentication-related issues using public-facing functionality.
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see [https://helpcenter.yeswehack.io/hunter/hunter-collaboration](help center). Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.
To submit a vulnerability report, you need to login with your hunter account. /programs/expressvpn-bug-bounty-program/create-report