Description

Capital.com is one of the world’s fastest-growing trading platforms – in fact, we were ranked as the fastest-growing company in the Middle East in the 2024 Deloitte Technology Fast 50. We serve our clients from offices across Europe, the UK, the Middle East and Australia. We keep our traders at the heart of every decision we make, facilitating their trading with intuitive technology, in-depth education and dedicated support. Our mission is to help traders make better decisions, by giving them the tools and resources they need to trade with confidence. It’s a mission that has won us multiple awards from leading industry authorities – like ‘Best Overall Trading Platform’ (Online Money Awards 2024) and ‘Best Trading App 2023’ (Good Money Guide) – and helped us gain an ‘excellent’ rating on Trustpilot.

Bounties
Low
0.1 - 3.9
Medium
4.0 - 6.9
High
7.0 - 8.9
Critical
9.0 - 9.4
Exceptional
9.5 - 10.0
Tier 1
min. €
max. €
50
100
100
1,000
1,000
5,000
5,000
9,000
9,000
15,000
Tier 1
€50 - €15,000
Tier 2
min. €
max. €
50
100
100
1,000
1,000
3,000
3,000
6,000
6,000
7,500
Tier 2
€50 - €7,500
Tier 3
min. €
max. €
0
100
100
500
500
1,000
1,000
1,500
1,500
2,250
Tier 3
Up to €2,250

Maximum bounty is determined by vulnerability type cap regardless of CVSS score.
Bounty depends on demonstrated business impact and asset criticality.

The final bounty amount is determined based on:

  • Demonstrated business impact
  • Sensitivity of affected data or functionality
  • Exploitability and reproducibility
  • Privilege level required
  • Scope and trust boundary crossed
  • Scalability of the attack
  • Quality and completeness of the report

The amounts listed in the table below represent the maximum available bounty for each vulnerability category and asset tier.
The final bounty will not exceed the maximum cap defined for the vulnerability type, regardless of CVSS score.

Maximum Bounty Caps

Vulnerabilities Tier 1 Tier 2 Tier 3
RCE 15000 7500 2250
Server-side injections (SQLi or an alternative) 9000 6000 1500
Read local file content (LFR, XXE) without restrictions (jail/chroot/other file type restrictions) 9000 6000 1500
RCE in the Dev infrastructure / isolated or virtualized process 5000 2500 750
Read local file content (LFR, XXE) in the Dev infrastructure / isolated or virtualized process 900 600 150
Full-read SSRF* 5000 3000 1000
XSS** 100 100 - 1000 50 - 500
IDOR / BAC 4500 1500 500
Business logic** 50 - 1000 50 - 1000 50 - 500
Subdomain takeover 100 100 100

*allowing access to internal services or cloud metadata
**depending on impact on the core application

XSS

XSS that does not allow access to authenticated sessions, user data, privileged functionality, or trust-boundary crossing may be classified as Low severity regardless of CVSS score and may be rewarded at the lower bound.

IDOR / Broken access control

Reward is determined by sensitivity of exposed data and privilege boundary crossed.

Business logic vulnerabilities (financial or workflow abuse)

Theoretical financial gain without practical exploitability may be rewarded at the lower bound.
Impact must be realistically reproducible under normal system constraints to qualify for higher rewards.

Subdomain takeover

Subdomain takeovers are classified as Low severity by default, without a CVSS score being assigned, as the primary attack vector is considered to rely on social engineering. If it can be demonstrated that the takeover can be chained with another vulnerability to achieve greater impact, the severity may be re-evaluated. Sufficient evidence or a proof-of-concept is expected in such cases.

Bounties for security issues affecting mycapital.capital.com are set at a lower level and are assessed on a case-by-case basis.

Rules of engagement
Not applicable
Not applicable
max. 10 requests /sec
Not applicable

By participating in this program, you agree to:

The following are not eligible to participate:

  • Current Capital.com employees;
  • Employees of partner companies;
  • Former Capital.com employees who left the company less than one year ago;

Check our fix
We offer up to €50 bonus to verify a resolved issue for us (when requested).
This remains at the discretion of Capital.com to award.

Assets
4 Skills
URL
Tier 1
*.backend-capital.com
4 Skills
Wildcard
Tier 2
capital.com/*
1 Skill
Wildcard
Tier 2
com.capital.trading
1 Skill
iOS
Tier 2
1 Skill
Android
Tier 2
1 Skill
URL
Tier 2
*.capital.com
5 Skills
Wildcard
Tier 3
*.itcapital.io
4 Skills
Wildcard
Tier 3
URL
No bounty
URL
No bounty
URL
No bounty
*affiliates.backend-capital.com
Wildcard
Out of scope
*eduapp.backend-capital.com
Wildcard
Out of scope
*education.backend-capital.com
Wildcard
Out of scope
URL
Out of scope
URL
Out of scope
URL
Out of scope
In scope

Any report that can demonstrate security impact to Capital.com assets and domains listed in the program.

Out of scope

Known Issues (date last updated: 02/03/2026)

  • YouTube API token
  • Ability to enable 2FA w/o email verification

Issues Without Demonstrable Security Impact

  • Reports generated solely by automated vulnerability scanners or tools without manual validation, clear reproduction steps, and demonstrated security impact;
  • Information disclosure that does not expose sensitive data (e.g., version banners, metadata, directory listings, usernames, debug messages, /metrics, /status, .htaccess files);
  • Disclosure of API keys, tokens, or credentials that:
    • Are not sensitive; or
    • Cannot be used to access, modify, or extract sensitive data or functionality;
  • Exposure of third-party API keys (including but not limited to Google API keys or monitoring/analytics service keys such as Sentry) where the key is properly restricted or cannot be used to access sensitive data or perform privileged actions. Abuse scenarios limited to generating logs, analytics events, monitoring traffic, or similar activity (e.g., spamming monitoring services) are not considered a security vulnerability;
  • Username or email enumeration without account compromise or meaningful abuse;
  • CORS misconfiguration on non-sensitive endpoints and/or without a working proof-of-concept demonstrating the ability to access sensitive data, perform authenticated actions, or otherwise exploit the misconfiguration;
  • Clickjacking without proof of sensitive action exploitation;
  • CSRF without meaningful state-changing impact (including logout CSRF);
  • Open redirects without demonstrable token theft or authentication bypass;
  • Host header injection without exploitability;
  • HTTP request smuggling without demonstrated impact;
  • SSRF vulnerabilities that cannot reach internal systems, metadata services, privileged infrastructure, or otherwise demonstrate meaningful security impact;
  • Subdomain takeover reports without proof of the ability to successfully claim the subdomain;
  • Content injection that does not modify executable HTML/JavaScript or change application behavior;
  • Self-XSS or same-site scripting that cannot impact other users;
  • Reflected file download attacks without demonstrated security impact;
  • Arbitrary file upload without proof of successful upload and accessibility;
  • Accessing undocumented or non-UI API endpoints that are part of intended backend functionality without bypassing authentication or authorization controls;
  • Scripting or active content embedded in PDF documents unless it results in demonstrated account compromise, data exfiltration, or remote code execution.

Missing Security Best Practices / Hardening Gaps

  • Missing security headers (CSP, X-Frame-Options, etc.);
  • Missing CSRF tokens;
  • Missing security cookie flags;
  • Reverse tabnabbing;
  • Autocomplete enabled on forms;
  • Password complexity, rotation, or reuse policies;
  • Rate limiting absence without demonstrated abuse impact;
  • WordPress XML-RPC enabled;
  • Version disclosure / banner grabbing;
  • Reports based solely on the version of a product, library, or protocol (e.g., TLS version) without a working proof-of-concept demonstrating exploitability in the current configuration and measurable security impact;
  • Lack of certificate pinning;
  • Lack of obfuscation or binary hardening;
  • Lack of jailbreak or root detection;
  • Lack of anti-debugging protections.

Abuse, Spam, and Resource Exhaustion

  • DDoS attacks;
  • Brute-force attacks;
  • Email bombing;
  • Rate-limit bypass without demonstrated account compromise or data exposure;
  • Homograph attacks;
  • Broken link hijacking (including news or social content);
  • Broken or outdated links in public content;

Email & Domain Configuration Issues

  • SPF, DKIM, or DMARC misconfiguration;
  • Email spoofing scenarios without platform compromise.

Issues Requiring Unrealistic or Compromised Environments

  • Attacks requiring physical access to a device;
  • Man-in-the-middle attacks;
  • Attacks that require prior unauthorized access to a victim account not obtained through a vulnerability in Capital.com systems;
  • Attacks that only work on jailbroken or rooted devices;
  • Runtime manipulation in modified environments;
  • Vulnerabilities requiring unrealistic user interaction, including but not limited to:
  • Manual modification of browser or device security settings;
  • Copying and executing JavaScript in the browser console;
  • Disabling built-in security protections;
  • Installing malicious applications or extensions;
  • Granting excessive permissions to untrusted software;
  • Attacks based on unproven third-party vulnerabilities as a prerequisite.

Mobile-Specific Exclusions

  • Clipboard or pasteboard leakage;
  • Shared links copied to clipboard;
  • URIs viewable by other applications;
  • Snapshot/background leakage;
  • Sensitive data transmitted over TLS;
  • Crashes due to malformed URL schemes;
  • Path disclosure within the application binary.

Administrative Limitations

  • Issues previously identified internally, already tracked by Capital.com, publicly disclosed, or reported by another researcher are not eligible for bounty;
  • Public 0-day or 1-day vulnerabilities may be considered duplicates for several weeks after publication if Capital.com is aware of the vulnerability from open sources and is actively working to remediate or mitigate it;
  • Credentials or secrets disclosed through public third-party data breaches or public leaks (e.g., paste sites, breach forums) without demonstrating a vulnerability in Capital.com systems;
  • Reports based on privately purchased, traded, or otherwise acquired leaked credentials, tokens, or access. Purchasing or obtaining leaked data from illicit sources is considered a violation of the program’s code of conduct and will be treated as out of scope.
Severity assessment

This program generally complies with Intigriti Triage Standards.

CVSS is used to determine vulnerability severity; however, the final bounty amount is determined based on vulnerability type, asset tier, and demonstrated business impact.

The amounts listed in the reward table represent maximum caps per vulnerability category. CVSS score alone does not determine the final payout.

FAQ

Where can I get credentials for the app?

You can self-register on the application. However, Capital.com cannot provide extra demo credits on these accounts.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid Intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

Overall stats
submissions received
838
average payout
€875
accepted submissions
86
total payouts
€56,870
Last 90 day response times
avg. time first response
< 4 days
avg. time to decide
< 3 weeks
avg. time to triage
< 5 days
Activity
4/3
Capital.com
closed a submission
4/2
Capital.com
unsuspended the program
4/2
Capital.com
suspended the program
4/2
logo
gokensai
created a submission
4/2
logo
esxr
created a submission
4/1
logo
dirtdiver48
created a submission
4/1
logo
junan
created a submission
4/1
logo
mkb
created a submission
4/1
Capital.com
accepted a submission
4/1
Capital.com
closed a submission