HackerOne · Bug Bounty

Adobe Bug Bounty Program

Complete guide to Adobe's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Adobe runs a bug bounty program on HackerOne. The program has 71 in-scope assets and is managed by HackerOne's triage team.

71
In-Scope Assets
0h
Avg Response
91%
Efficiency
33d
Avg Bounty Time

In-Scope Assets

AssetTypeMax SeverityEligible
*.acrobat.adobe.comWILDCARDCriticalBounty
*.lightroom.adobe.comOTHERCriticalBounty
Acrobat AI AssistantOTHERCriticalBounty
Acrobat Create PodcastOTHERCriticalBounty
Acrobat Create PresentationsOTHERCriticalBounty
Acrobat PDF SpacesOTHERCriticalBounty
Acrobat ReaderDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Adobe Acrobat Reader DCDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Adobe Commerce, Commerce B2B and Commerce Open SourceOTHERCriticalBounty
After EffectsDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
AnimateDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
AuditionDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Behance Freelance Job creationOTHERCriticalBounty
BridgeDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
C2PA ToolOTHERCriticalBounty
Character AnimatorDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
ColdFusionDOWNLOADABLE_EXECUTABLESCriticalBounty
DimensionDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
DreamweaverDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Express AI AssistantOTHERCriticalBounty
Firefly Image ModelsOTHERCriticalBounty
Firefly Video ModelOTHERCriticalBounty
FramemakerDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
IllustratorDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
InCopyDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
InDesignDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Lightroom "Edit suggestions" Tech PreviewOTHERCriticalBounty
Lightroom AI EditsOTHERCriticalBounty
Lightroom ClassicDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Media EncoderDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
OtherOTHERCriticalNo Bounty
PhotoshopDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Photoshop AI AssistantOTHERCriticalBounty
Premiere ProDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Premiere RushDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Stock AI StudioOTHERCriticalBounty
Substance 3DDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
XDDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
account.adobe.comURLCriticalBounty
account.magento.comURLCriticalBounty
adobe.fresco.iosAPPLE_STORE_APP_IDCriticalBounty
adobeid-na1.services.adobe.comURLCriticalBounty
auth.services.adobe.comURLCriticalBounty
com.adobe.Adobe-ReaderAPPLE_STORE_APP_IDCriticalBounty
com.adobe.PSMobileAPPLE_STORE_APP_IDCriticalBounty
com.adobe.lrmobileAPPLE_STORE_APP_IDCriticalBounty
com.adobe.lrmobileGOOGLE_PLAY_APP_IDCriticalBounty
com.adobe.readerGOOGLE_PLAY_APP_IDCriticalBounty
com.adobe.scan.androidGOOGLE_PLAY_APP_IDCriticalBounty
com.adobe.scan.iosAPPLE_STORE_APP_IDCriticalBounty

Showing 50 of 71 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • Magento 1 Enterprise (Commerce) and Community (Open Source) Editions
  • Tier 3 (AI Bonus Tier)
  • behance.net

Tips for Hacking Adobe

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Adobe?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Adobe pay bounties?

Yes, Adobe offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Adobe accept?

Adobe accepts reports for vulnerabilities found in their 71 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.