Web Vulnerability Submissions Exploded in 2023

There was an alarming surge of user-submitted web vulnerability submissions in 2023-with a 30% increase compared to 2022-as open-scoped bug bounty programs evolved, according to a report from Bugcrowd.
The study found API submissions, which report vulnerabilities or potential security issues involving application programming interfaces, rose by 18%, while Android submissions increased by 21% and Apple iOS submissions grew by 17%. Bugcrowd's report, compiled from millions of proprietary data points and vulnerabilities, also highlighted the government sector's growth in crowdsourced security, showing a 151% increase in vulnerability submissions and a 58% rise in Priority 1 rewards.
These rewards are typically associated with the most severe and impactful security issues that could potentially lead to serious consequences if exploited.
Programs with open scopes, offering higher rewards, proved most successful, indicating the impact of crowdsourced solutions like penetration-testing-as-a-service, managed bug bounties and vulnerability disclosure programs.
Enterprises increasingly favored public crowdsourced programs, with financial services and government sectors leading in P1 payouts.
P1 vulnerabilities often involve critical security flaws that, if exploited by malicious actors, could result in significant data breaches, system compromises, or other severe consequences for the affected organization.
Callie Guenther, senior manager of cyber threat research at Critical Start, said from a threat intelligence perspective, the findings underscored a critical escalation in the cybersecurity threat landscape.
This involves not only bolstering detection and response capabilities through advanced AI and machine learning systems but also ensuring that these systems are ethically designed to counter AI-driven attacks.
This necessitates a shift towards a zero-trust architecture and more rigorous network segmentation to contain breaches effectively.
She added that the trend towards open-scoped bug bounty programs, while beneficial in uncovering a wider range of vulnerabilities, introduces additional risks and challenges.
John Bambenek, president at Bambenek Consulting, said any bug bounty program needs to be backed with the software engineering expertise to help resolve issues quickly.
He noted that while this is a good thing, engineering needs to be prepared to resolve the reports to minimize multiple researchers reporting the same vulnerability simply because it continues to exist for months after the initial report.
Guenther added that organizations must carefully balance the need for comprehensive security testing with the potential exposure of sensitive systems.
From her perspective, the human element in cybersecurity is becoming increasingly pivotal.
John Gallagher, vice president of Viakoo Labs at Viakoo, said with the rise of AI-driven social engineering attacks, employee training needs to show what is possible.
Employee training needs to emphasize that all parts of the company are targets for cybercriminals, and that best practices always apply to all job functions.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 26 Jan 2024 14:58:04 +0000


Cyber News related to Web Vulnerability Submissions Exploded in 2023

Web Vulnerability Submissions Exploded in 2023 - There was an alarming surge of user-submitted web vulnerability submissions in 2023-with a 30% increase compared to 2022-as open-scoped bug bounty programs evolved, according to a report from Bugcrowd. The study found API submissions, which report ...
1 year ago Securityboulevard.com
Revolutionizing WordPress Bug Bounty and Security: Latest Enhancements to the Wordfence Bug Bounty Program - Our team has triaged around 2,140 vulnerability submissions, with about 1,320 deemed in-scope. Together with our researchers and software vendors, we've protected millions of websites from vulnerabilities - and this is just the beginning. We're ...
1 year ago Wordfence.com
FTC soliciting contest submissions to help tackle voice cloning technology - The Federal Trade Commission is now accepting submissions for a contest designed to spur development of products and policies to protect consumers from the malicious use of voice cloning technology, which has been fueled by the advance of ...
2 years ago Therecord.media
FTC offers $25,000 prize for detecting AI-enabled voice cloning - The U.S. Federal Trade Commission has started accepting submissions for its Voice Cloning Challenge, a public competition with a $25,000 top prize for ideas that protect consumers from the danger of AI-enabled voice cloning for fraudulent activity. ...
2 years ago Bleepingcomputer.com Scattered Spider
Vulnerability Summary for the Week of November 27, 2023 - PrimaryVendor - Product apple - multiple products Description A memory corruption vulnerability was addressed with improved locking. Published 2023-12-01 CVSS Score not yet calculated Source & Patch Info CVE-2023-48842 PrimaryVendor - Product dell - ...
2 years ago Cisa.gov CVE-2023-48842 CVE-2023-43089 CVE-2023-39226 CVE-2023-46690 CVE-2023-47207 CVE-2023-46886 CVE-2023-48882 CVE-2023-49656 CVE-2023-28896 CVE-2023-48016 CVE-2023-49092 CVE-2023-2266 CVE-2023-2267 CVE-2023-31177 CVE-2023-34388 CVE-2023-34389 CVE-2023-48848 CVE-2023-4398
10 Best Dark Web Monitoring Tools in 2025 - DarkOwl is a comprehensive dark web monitoring tool that provides organizations with real-time intelligence on emerging threats and data breaches. Recorded Future is a comprehensive dark web monitoring tool that leverages machine learning and ...
5 months ago Cybersecuritynews.com
CISA: Thousands of bugs remediated in second year of vulnerability disclosure program - With 11 new agency programs onboarding in 2023, the VDP Platform drew heightened researcher attention and engagement, which facilitated a marked increase in the volume of vulnerability submissions received, valid vulnerabilities identified and ...
1 year ago Therecord.media
Critical WordPress Plugin Vulnerability Exposes 200k Websites to Site Takeover Attack - The vulnerability, assigned CVE-2025-6691 with a CVSS score of 8.8, allows unauthenticated attackers to delete arbitrary files on affected servers, including the crucial wp-config.php file that controls WordPress database connections. The SureForms ...
6 months ago Cybersecuritynews.com CVE-2025-6691
CVE-2024-37051 - GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 ...
1 year ago Tenable.com
CVE-2021-34647 - The Ninja Forms WordPress plugin is vulnerable to sensitive information disclosure via the bulk_export_submissions function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated ...
3 years ago
CVE-2024-53258 - Autolab is a course management service that enables auto-graded programming assignments. From Autolab versions v.3.0.0 onward students can download all assignments from another student, as long as they are logged in, using the ...
1 year ago Tenable.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
10 months ago Cybersecuritynews.com
Web Shells Gain Sophistication for Stealth, Persistence - Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly popular as attackers become more cloud-aware, experts say. A Web shell known as ...
2 years ago Darkreading.com
CVE-2023-23715 - Missing Authorization vulnerability in JobBoardWP JobBoardWP – Job Board Listings and Submissions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JobBoardWP – Job Board Listings and Submissions: from n/a ...
1 year ago Tenable.com
CVE-2025-32670 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mark Parnell Spark GF Failed Submissions allows Reflected XSS. This issue affects Spark GF Failed Submissions: from n/a through 1.3.5. ...
8 months ago
Why CVEs Are an Incentives Problem - I've been thinking about some of these unintended consequences in the context of a growing problem faced by all of us in cybersecurity: how a fast-rising tide of software vulnerabilities tracked as common vulnerabilities and exposures - are reported ...
1 year ago Darkreading.com
Critical WordPress Plugin Vulnerability Exposes 600,000+ Sites to Remote Takeover - The vulnerability, assigned CVE-2025-6463 with a high CVSS rating of 8.8, allows unauthenticated attackers to delete critical system files, including wp-config.php, potentially leading to complete site takeover and remote code execution. The patch ...
6 months ago Cybersecuritynews.com CVE-2025-6463
CVE-2025-58016 - Missing Authorization vulnerability in Codexpert, Inc CF7 Submissions allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CF7 Submissions: from n/a through 0.26. ...
3 months ago
CVE-2025-24888 - The SecureDrop Client is a desktop application for journalists to communicate with sources and work with submissions on the SecureDrop Workstation. Prior to version 0.14.1, a malicious SecureDrop Server could obtain code execution on the SecureDrop ...
10 months ago Tenable.com
RomCom RAT Attacking UK Organizations Via Customer Feedback Portals - Cybersecurity experts recommend organizations implement strict input validation on customer feedback forms, disable JavaScript processing in feedback management systems, and employ application allowlisting to prevent unauthorized code execution. A ...
8 months ago Cybersecuritynews.com
Rilide Malware as Browser Extension Attacking Chrome & Edge Users to Steal Login Credentials - The malware leverages browser extension capabilities to seamlessly integrate with the victim’s browsing experience, making detection particularly challenging for conventional security solutions. A sophisticated malware strain dubbed ...
9 months ago Cybersecuritynews.com
CVE-2021-34648 - The Ninja Forms WordPress plugin is vulnerable to arbitrary email sending via the trigger_email_action function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to send ...
3 years ago
CVE-2013-4230 - The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the "Who can read data ...
8 years ago
CVE-2018-19287 - XSS in the Ninja Forms plugin before 3.3.18 for WordPress allows Remote Attackers to execute JavaScript via the includes/Admin/Menus/Submissions.php (aka submissions page) begin_date, end_date, or form_id parameter. ...
7 years ago
CVE-2024-2043 - The EleForms – All In One Form Integration including DB for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when downloading form submissions in all versions up to, and including, ...
1 year ago