
Vercel Platform Protection
External Program
Submit bugs directly to this organization


External Program
Submit bugs directly to this organization
Vercel is looking for valid reports which demonstrate a successful bypass of Vercel WAF rules, allowing for exploitation of React2Shell (CVE-2025-55182, 2025-66478).
We are making this public program available for responsible disclosure of critical WAF workarounds on the Vercel platform. Please do not discuss these vulnerabilities (even resolved ones) outside of the program without express consent from Vercel. Follow HackerOne's disclosure guidelines.
Successful exploitations of React2Shell (CVE-2025-55182, 2025-66478) to bypass Vercel's WAF only. An application has been setup for this purpose - only conduct testing here: https://nextjs-cve-hackerone.vercel.app/
Please Note: This program will only issue rewards for valid critical vulnerabilities that fall within the scope of the specified CVE. Any submissions that do not relate to this CVE, or that do not meet the criteria for a critical vulnerability, will be redirected to our other program. Those submissions will be evaluated according to our standard program policies and guidelines.
VERCEL_PLATFORM_PROTECTION. Only reports that successfully retrieve this secret will be accepted.Demonstrate a successful attack by providing the secret within the environment variable VERCEL_PLATFORM_PROTECTION behind the testing application: https://nextjs-cve-hackerone.vercel.app/. There will be a required field for this when you submit a report.
Thank you for helping keep Vercel and our users safe!