Meta

Meta
FacebookInstagramXYouTube
Meta Bug Bounty
Meta Bug Bounty overviewLeaderboardsProgram scopeProgram termsHacker Plus benefitsHacker Plus terms

Program tools
SSRF validatorTest accountsFBDLAccess token debuggerGraph API explorer

Payout guidelines
Payout guidelines overviewMobile remote code executionAccount take-overMeta hardware devicesServer side request forgery (SSRF)Platform privacy assertions2FA bypassContact point deanonymizationPage admin disclosureCross-site leaks

Data Abuse program
Data Abuse program overviewData Abuse termsReport abuseManage reports

Site terms and policies
Privacy policyTermsCookie policy

Meta Bug Bounty
Meta Bug Bounty overview
Leaderboards
Program scope
Program terms
Hacker Plus benefits
Hacker Plus terms
Program tools
SSRF validator
Test accounts
FBDL
Access token debugger
Graph API explorer
Payout guidelines
Payout guidelines overview
Mobile remote code execution
Account take-over
Meta hardware devices
Server side request forgery (SSRF)
Platform privacy assertions
2FA bypass
Contact point deanonymization
Page admin disclosure
Cross-site leaks
Data Abuse program
Data Abuse program overview
Data Abuse terms
Report abuse
Manage reports
Site terms and policies
Privacy policy
Terms
Cookie policy
Meta Bug Bounty
Meta Bug Bounty overview
Leaderboards
Program scope
Program terms
Hacker Plus benefits
Hacker Plus terms
Program tools
SSRF validator
Test accounts
FBDL
Access token debugger
Graph API explorer
Data Abuse program
Data Abuse program overview
Data Abuse terms
Report abuse
Manage reports
Payout guidelines
Payout guidelines overview
Mobile remote code execution
Account take-over
Meta hardware devices
Server side request forgery (SSRF)
Platform privacy assertions
2FA bypass
Contact point deanonymization
Page admin disclosure
Cross-site leaks
Site terms and policies
Privacy policy
Terms
Cookie policy
Meta Bug Bounty
Meta Bug Bounty overview
Leaderboards
Program scope
Program terms
Hacker Plus benefits
Hacker Plus terms
Program tools
SSRF validator
Test accounts
FBDL
Access token debugger
Graph API explorer
Payout guidelines
Payout guidelines overview
Mobile remote code execution
Account take-over
Meta hardware devices
Server side request forgery (SSRF)
Platform privacy assertions
2FA bypass
Contact point deanonymization
Page admin disclosure
Cross-site leaks
Data Abuse program
Data Abuse program overview
Data Abuse terms
Report abuse
Manage reports
Site terms and policies
Privacy policy
Terms
Cookie policy
Legal
* All payout amounts are in USD

©2025 Meta.

Skip to main content
Meta
Meta Bug Bounty
Tools
Leaderboard
Learn
Submit a report

Server Side Request Forgery (SSRF)

Max payout:

$40k*

Guidelines

These guidelines show how we assess the impact of Server Side Request Forgery (SSRF) type of vulnerabilities. We cap the maximum payout for an SSRF at $40,000* and then apply any applicable deductions to arrive at the final awarded bounty amount.

In order to help our researchers, we have set up a canary endpoint for researchers to test potential SSRF findings. If you manage to hit the internal link, it will raise an alert for Meta Security to investigate. To note, if you are able to retrieve the canary token (which means that you can read data from the SSRF), please be sure to include the canary token in your submission.

The SSRF test endpoint: https://www.internalfb.com/intern/bug-bounty/get-canary-token/

Payouts

SSRF
up to
$40k*

Maximum payouts

SSRF in production and reading the response (must include canary in your report)
up to
$40k*
Blind SSRF in production and not reading the response (must trigger the canary alert)
up to
$30k*
Hitting arbitrary endpoints within a corporate network (e.g. through an unpatched CVE on a third-party system)
up to
$10k*
If you can only hit a small number of endpoints within the corporate network (e.g. a small set of hosts or loopback only)
up to
$1k*
Hypothetical bugs and payouts
  • $5,000* - A bonus is applied if you demonstrate full control of the HTTP request (e.g. can easily modify the method, or the content type)

  • A deduction is applied if the request is rate limited or is only made after a certain period of time (e.g. a script running once a day which then fetches the provided URL)