OpenAI Launched Bug Bounty Program – Rewards up to $20,000

It’s been almost half a year since the revolutionary ChatGPT was released. Amazingly, it reached 100 million users in just two months.

ChatGPT has an unimaginable potential to answer things that need a lot of research. Due to its increasingly demanding usage, securing it from threat actors is also essential. 

The Microsoft-backed platform has launched its Bug Bounty Program on BugCrowd. Many Security researchers have already found some vulnerabilities on ChatGPT, and we’re posting them now and then.

However, it is now an excellent opportunity for security professionals to report their bugs and get rewarded for their work.

Their rewards are below as per their Bug bounty program and the VRT (Vulnerability Rating Taxonomy) of Bugcrowd.

  • P4 – $200 – $500
  • P3 – $500 – $1000
  • P2 – $1000 – $2000
  • P1 – $2000 – $6500

The program also mentioned that the reward can go up to a maximum of $20,000, making it a huge reward for critical bugs. So far, 14 Vulnerabilities have been reported on the program.

Scope of the Program

The following applications are in scope.

  • ChatGPT, ChatGPT Plus, Logins, Subscriptions, OpenAI-created Plugins created by users, and all other functionalities.

Bugs that can be reported include,

  • XSS or Stored XSS
  • CSRF
  • SQLi
  • Authentication and Authorization Issues
  • Data Exposure
  • Payment based bugs
  • Cloudflare Bypass to send traffic to unprotected endpoints
  • Running queries on private models that are not available to the Public
  • Browsing or Code Interpreter Plugins created by OpenAI
  • SSRF
  • OAuth Flaws
  • Credential Security and making plugin calls to unrelated domains

Since OpenAI has access to the entire internet, issues related to Google Workspace, Asana, Trella, Jira, Monday.com, Notion, Hubspot, and many more related issues related to OpenAI can also be reported.

However, there are restrictions to perform additional security testing on these companies.

Subdomains of openai are also included in the scope of the program. The subdomains of OpenAI can be found at 

  • *.openai.com

Out-of-Scope Vulnerabilities

Though most bugs are eligible for reporting, some of the bugs listed below are out of the program’s scope.

  • Issues based on the Model
  • Brute Forcing API
  • Fuzzing, password spraying unauthorized attacks
  • Stolen or Leaked Credentials stemming
  • Clickjacking
  • SSL/TLS Cipher security issues with PoC
  • Server error messages without exploit proof
  • Old/EoL browser/ plugins related issues and much more

For more information, refer to the Out-of-Scope topic on BugCrowd.

Struggling to Apply The Security Patch in Your System? – 

Related Read:

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Xanthorox AI: New Automated Hacking Tool Surfaces on Hacker Forums

A new malicious AI tool, Xanthorox AI, has emerged on underground hacker forums. Dubbed the "Killer…

5 minutes ago

Apollo Router Vulnerability Enables Resource Exhaustion via Optimization Bypass

A critical vulnerability (CVE-2025-32032) has been identified in Apollo Router, a widely used GraphQL federation…

43 minutes ago

WhatsApp for Windows Flaw Allowed Remote Code Execution via File Attachments

A critical vulnerability identified as CVE-2025-30401 was recently disclosed, highlighting a major security flaw in WhatsApp for…

1 hour ago

PoC Exploit Reveals SSH Key Exposure via Yelp Vulnerability on Ubuntu

Security researchers have uncovered a critical vulnerability (CVE-2025-3155) in Ubuntu's default help browser Yelp that…

2 hours ago

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified as…

11 hours ago

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app that…

11 hours ago