Vulnerability Disclosure

At Cleeng, we take the security of our systems and our customers seriously. We appreciate responsible researchers who help us identify potential vulnerabilities so we can address them quickly and safely.

If you believe you have discovered a security issue in any Cleeng service, please report it to us responsibly as described below.

How to Report

Please send your report to [email protected].

📘

Each submission should describe only one specific vulnerability.

If you’ve identified multiple issues, please submit them separately so that each can be tracked, verified, and resolved efficiently.

Include in your report:

  • A clear and detailed description of the vulnerability.
  • Steps to reproduce or a working proof-of-concept (PoC).
  • The affected URL, endpoint, or system component.
  • Any supporting evidence (screenshots, logs, payloads).

Please avoid testing that could impact users or service availability (e.g., denial-of-service, data extraction, or brute-force).

Response and Communication Timeline

We value transparency and commit to providing timely updates during the review process.

PhaseTarget Response Time
Acknowledgmentwithin 2 business days
Initial verification and triagewithin 10 business days
Bounty decisionwithin 5 business days after triage completion
Bounty payoutwithin 10 business days after receiving a valid invoice

If we require more information to reproduce or validate the finding, we’ll reach out during the triage phase.

Reward Program

Valid, unique, and impactful vulnerabilities may qualify for a monetary reward. Reward amounts depend on internal severity assessment.

Duplicate, out-of-scope, or purely informational findings do not qualify for a bounty but may still be acknowledged in our Hall of Fame.

Examples of Vulnerabilities Impact

High Impact:

  • Remote code execution (RCE) vulnerabilities that allow an attacker to execute code on the server without authorization.
  • Authentication bypass vulnerabilities that allow an attacker to bypass authentication mechanisms and gain unauthorized access to sensitive resources.
  • SQL injection vulnerabilities that allow an attacker to inject malicious SQL code into a database query and manipulate or retrieve sensitive data.

Medium Impact

  • Cross-site scripting (XSS) vulnerabilities that allow an attacker to inject malicious scripts into a web page viewed by other users.
  • Cross-site request forgery (CSRF) vulnerabilities that allow an attacker to forge a request to a web application that is executed in the context of an authenticated user.
  • Denial-of-service (DoS) vulnerabilities that allow an attacker to overload a server or application by sending a large number of requests or exploiting a resource exhaustion issue.

Low Impact:

  • Information disclosure vulnerabilities that allow an attacker to obtain sensitive information about a system or user without authorization.
  • Session fixation vulnerabilities that allow an attacker to manipulate a user's session ID and gain unauthorized access to sensitive resources.
  • Weak password policies that allow an attacker to guess or brute-force user passwords and gain unauthorized access to sensitive resources.

Out of Scope Vulnerabilities

The following types of vulnerabilities are considered out of scope:

  • Issues without a clear security impact or exploit path.
  • Generic best-practice recommendations (e.g., missing headers, TLS settings) without a working PoC showing exploitation potential.
  • Use of outdated dependencies with no demonstrable risk.
  • Self-XSS or issues requiring unrealistic user interaction.
  • Denial-of-service, brute-force, or social engineering attempts.
  • Findings related to third-party software or infrastructure not owned or operated by Cleeng.
  • Automated scanner output or theoretical “what-if” scenarios.

Hall of Fame

Researchers whose work helps improve Cleeng’s security posture may be recognized in our Hall of Fame.