When submitting a vulnerability report, include the following:
- A detailed description of the vulnerability.
- Reproduction steps and a working PoC with a CVSS score.
- The impact assessment of the vulnerability.
- Screenshots or other evidence if applicable.
- The email address used on the website for context.
- Brief remediation guidelines if possible.
Providing thorough and clear information helps us assess and address the issue more effectively.