waha icon indicating copy to clipboard operation
waha copied to clipboard

πŸ’΅ Bug Bounty – $2,100 if You Can Bypass WAHA API Key Validation

Open devlikepro opened this issue 6 months ago β€’ 8 comments

πŸ‘€ Human-Only Submissions

If you made the report with GPT/LLM/Agents - don’t send it. GPT-generated crap will not be reviewed. Give the human steps to follow, assuming we have WAHA installation already, just plain curl or commands

πŸ’΅ Bug Bounty – $2,100 if You Can Bypass WAHA API Key Validation

Hi πŸ‘‹ We're offering 2,100 USDT to anyone who can bypass the WAHA_API_KEY check on the WAHA HTTP API and:

  • Send a WhatsApp message
  • Or fetch the session list

Conditions:

  • Installed using the guide https://waha.devlike.pro/docs/how-to/install/
  • WAHA_API_KEY is a SHA-512 hash of a random UUIDv4
  • HTTPS connection (so you can not inspect the traffic)
  • devlikeapro/waha image is enough, no WAHA Plus required
  • No knowledge of the api key should be assumed

How to submit: Email your exploit privately to [email protected] with steps, payloads, and evidence.

Notes:

  • First valid report wins (if reports about the same exploit)
  • No known or theoretical issues – must be reproducible
  • Related source code you can find in /src/core/auth folder!

Thanks for helping secure WAHA! πŸ™

patron:PRO


devlikepro avatar Jun 25 '25 06:06 devlikepro

$2,100!

patron:PRO

devlikepro avatar Jul 20 '25 06:07 devlikepro

bypass waha api for send this message?

masadjie avatar Jul 25 '25 15:07 masadjie

I had subscribed to WAHA, but after 1–2 months, my account got hacked. I had kept the default username/password (my mistake), but I never shared my server IP with anyone, so it’s unclear how it was accessed.

Now, WhatsApp accounts linked to my WAHA started sending random marketing messages β€” even international ones β€” and a new WhatsApp number also appeared on my installation. Can you please help me look into this?

umairabubakkar avatar Jul 28 '25 00:07 umairabubakkar

I had subscribed to WAHA, but after 1–2 months, my account got hacked. I had kept the default username/password (my mistake), but I never shared my server IP with anyone, so it’s unclear how it was accessed.

Now, WhatsApp accounts linked to my WAHA started sending random marketing messages β€” even international ones β€” and a new WhatsApp number also appeared on my installation. Can you please help me look into this?

May be you was a victim of scanning sites like shodan, several hackers scan for login sites and they try with default login and password...

Henrique-Miranda avatar Jul 28 '25 01:07 Henrique-Miranda

I never shared my server IP with anyone, so it’s unclear how it was accessed.

Correct, https://www.shodan.io/ is pretty easy to use

patron:PRO

devlikepro avatar Jul 28 '25 11:07 devlikepro

Hello, good evening everyone!

I have information about the bug and the alleged scams.

Here's my contact information:

[email protected]

jucadasiklacf avatar Aug 30 '25 00:08 jucadasiklacf

⬇️Check your emails guys⬇️

  • @Robson-Rissato
  • @bobykurniawan11
  • @necto-cms

100 USDT bug bounty sent, thanks to anonymous who found gh tokens in the internet :)

Not related to WAHA API tho, so we're safe for now

patron:PRO

devlikepro avatar Sep 15 '25 03:09 devlikepro

Hello, I've submitted a report 3 days ago - can you confirm that was received?

italo1983 avatar Oct 22 '25 12:10 italo1983

I want to ask: if I submit the exploit to get some features on WAHA that are only available on WAHA Plus, what will I get from this or its not valid?

noorgx avatar Nov 18 '25 08:11 noorgx

where you send this ?

On Mon, Sep 15, 2025, 10:31 devlikeapro @.***> wrote:

devlikepro left a comment (devlikeapro/waha#1076) https://github.com/devlikeapro/waha/issues/1076#issuecomment-3290351919

⬇️Check your emails guys⬇️

100 USDT bug bounty sent, thanks to anonymous who found gh tokens in the internet :)

Not related to WAHA API tho, so we're safe for now

[image: patron:PRO] https://waha.devlike.pro/docs/how-to/plus-version/#tiers

β€” Reply to this email directly, view it on GitHub https://github.com/devlikeapro/waha/issues/1076#issuecomment-3290351919, or unsubscribe https://github.com/notifications/unsubscribe-auth/AQAMNGU3AX3IXWFZASGBCJD3SYXI5AVCNFSM6AAAAACACLKRJCVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZTEOJQGM2TCOJRHE . You are receiving this because you were mentioned.Message ID: @.***>

necto-cms avatar Nov 18 '25 10:11 necto-cms

Email your exploit privately to [email protected] with steps, payloads, and evidence.

patron:PRO

devlikepro avatar Nov 25 '25 07:11 devlikepro

⬇️Check your emails guys⬇️

100 USDT bug bounty sent, thanks to anonymous who found gh tokens in the internet :)

Not related to WAHA API tho, so we're safe for now

patron:PRO

Would you please provide more information about this. What is it? and how does it relate to WAHA API?

jubariTravel avatar Nov 25 '25 18:11 jubariTravel

I sent a report, could you please confirm if you received it?

mhanelia avatar Nov 27 '25 14:11 mhanelia