Important Notice
The clue is in its name: Damn Vulnerable Web Application contains both intentional and unintentional vulnerabilities. This is by design.About DVWA’s Vulnerabilities
Intentional Vulnerabilities
DVWA’s main goal is to be an aid for:- Security professionals to test their skills and tools in a legal environment
- Web developers to better understand the processes of securing web applications
- Students and teachers to learn about web application security in a controlled classroom environment
Documented and Undocumented Vulnerabilities
There are both documented and undocumented vulnerabilities in this software. This is intentional. You are encouraged to try and discover as many issues as possible.
Why NOT to Report Vulnerabilities in DVWA
Please Don’t Submit Vulnerability Reports
To put it simply: please don’t report vulnerabilities in DVWA! Once a year or so, someone submits a report for a vulnerability they’ve found in the app. Some are well written (sometimes better than paid pen test reports), while others are just “you are missing headers, pay me”. The app has vulnerabilities - it is deliberate:- Most are documented - The well-documented ones that you work through as lessons
- Some are “hidden” - Ones to find on your own
The CVE Incident
In 2023, this elevated to a whole new level when someone decided to request a CVE for one of the vulnerabilities. They were assigned CVE-2023-39848. Much hilarity ensued and time was wasted getting this corrected.Showcase Your Skills Instead
If you really want to show off your skills at finding the hidden extras, we encourage you to:- Write a blog post about your findings
- Create a video demonstrating the vulnerability and how you found it
- Share your methodology to help others learn
If you send us a link to your blog post or video, we may even include it in the references section.
Responsible Disclosure for Project Infrastructure
While DVWA itself is intentionally vulnerable, the project infrastructure (GitHub repository, website, etc.) should not be.When to Report
You should report security issues if you find vulnerabilities in:- The GitHub repository infrastructure
- The project website
- The documentation site
- Build/deployment processes
- Any non-application infrastructure
How to Report Infrastructure Issues
If you discover a legitimate security issue with the project infrastructure (not the application itself):- Do not open a public GitHub issue
- Contact the project maintainers privately
- Provide detailed information about the issue
- Allow time for the issue to be addressed before public disclosure
What NOT to Report
Please do not report:- SQL injection vulnerabilities in DVWA
- Cross-site scripting (XSS) in DVWA
- Command injection in DVWA
- File upload vulnerabilities in DVWA
- Any other intentional vulnerability in the application
- Missing security headers in DVWA
- Any vulnerability that is part of the learning modules
Safety Warning
Recommended Setup
It is recommended to use:- A virtual machine (such as VirtualBox or VMware)
- Set to NAT networking mode
- Inside the guest machine, download and install XAMPP for the web server and database
Disclaimer
We do not take responsibility for the way in which anyone uses this application (DVWA). We have:- Made the purposes of the application clear
- Warned that it should not be used maliciously
- Taken measures to prevent users from installing DVWA on live web servers
Educational Purpose
DVWA is designed for legal, educational purposes only. Use it to:- Learn about web application security
- Practice penetration testing skills
- Understand common vulnerabilities
- Test security tools
- Train development teams on secure coding
Summary
- DVWA is intentionally vulnerable - do not report these vulnerabilities
- Do not request CVEs for DVWA’s intentional vulnerabilities
- Only deploy DVWA in isolated, secure environments (VMs, local networks)
- Infrastructure issues with the project itself can be reported privately
- Share your findings through blog posts or videos to help others learn
Project Links
- Project Home: https://github.com/digininja/DVWA
- Issue Tracker: https://github.com/digininja/DVWA/issues
Created by the DVWA team
