Q1 2025 Web3 Security ReportAccess control failures led to $1.63 billion in losses
Discover report insights
  • Hacken
  • Audits
  • kcex
  • [PT] KCEX / Web+API / Mar2025
KCEX logo

KCEX

Audit name:

[PT] KCEX / Web+API / Mar2025

Date:

Jun 24, 2025

Table of Content

Introduction
Audit Summary
System Overview
Findings
Appendix 1. Severity Definitions
Appendix 2. Scope
Disclaimer

Want a comprehensive audit report like this?

Introduction

We express our gratitude to the KCEX team for the collaborative engagement that enabled the execution of this Pentest.

KCEX is a centralized cryptocurrency trading platform launched in 2021 and registered in Seychelles. It supports spot and futures trading with up to 100x leverage across a wide variety of digital assets.  Account creation requires no KYC; users can sign up and start trading using just an email or phone number.

Document

NameWeb Pentest and Security Analysis Report for KCEX
Audited ByGul Hameed
Approved ByStephen Ajayi
Websitehttps://www.kcex.com/
Changelog28/03/2025 - Preliminary Report
Changelog24/06/2025 - Final Report
PlatformWeb, API
Language/Tech StackREACT, Next.js, JavaScript
TagsPentest, BlackBox
Methodologyhttps://hackenio.cc/pentest_methodology
  • Document

    Name
    Web Pentest and Security Analysis Report for KCEX
    Audited By
    Gul Hameed
    Approved By
    Stephen Ajayi
    Changelog
    28/03/2025 - Preliminary Report
    Changelog
    24/06/2025 - Final Report
    Platform
    Web, API
    Language/Tech Stack
    REACT, Next.js, JavaScript
    Tags
    Pentest, BlackBox

Protect your dApp with insights like these.

Audit Summary

12Total Findings
10Resolved
2Accepted
0Mitigated

The system users should acknowledge all the risks summed up in the risks section of the report

Threat Modeling and Attack Surface Coverage

As part of the web and API penetration testing of the KCEX Exchange platform, we conducted a thorough threat modeling exercise to identify potential risks, map the application’s attack surface, and assess exploitable vectors in line with the business logic of a centralized exchange. The analysis was guided by a combination of real-world adversary techniques and security best practices, focusing on areas most likely to impact confidentiality, integrity, and availability. Below is a breakdown of the core areas analyzed and the threats evaluated during testing:

Threat Modeling: Registration & Authentication A variety of vectors were examined, including but not limited to:

  • Bypassing registration limits via browser fingerprint manipulation

  • Multiple account creation using email aliases

  • Denial-of-service through forced account lockout

  • Brute-force attempts against verification code endpoints

  • Insecure or weak password enforcement

  • Acceptance of expired or reused verification codes

  • Missing rate limits on password attempts

  • Logic flaws in OAuth-based login flow

  • Insecure handling of phone/email-based authentication

  • Abuse of password reset to target other users

  • Sessions not invalidated after password reset

  • Bypass of 2FA via password reset loopholes

Threat Modeling: Authorization & Access Controls

A variety of vectors were examined, including but not limited to:

  • Privilege escalation through misconfigured access controls

  • Signature Replay Attacks enabling the reuse of API requests to place unauthorized trades or withdrawals.

  • Bypassing 2FA protections via authentication loopholes

  • Exploiting weak session management to hijack active sessions

  • Manipulating third-party account linking for unauthorized access

  • Circumventing withdrawal security checks by modifying address verification logic

  • Adding unauthorized withdrawal addresses to victim accounts

  • Subverting KYC verification through fake document submissions

  • Resetting security configurations using falsified identity verification

  • Abuse of anti-phishing codes to mislead users into phishing attacks

  • Exploiting weak file upload validation for arbitrary file execution

  • Manipulating event-based reward mechanisms via unauthorized invite codes

  • Unauthorized deletion of other users’ spot and futures orders through IDOR

  • Exploiting profile update mechanisms to bypass intended security restrictions

  • Email Spoofing via misconfigured DMARC policy.

  • Exploiting Cross site request forgery (CSRF) for account takeovers and unauthorized account modification

  • Exploiting Cross origin resource sharing (CORS) for sensitive data exposures.

  • Exploiting Cache Poisoning Issue for potential DOS and Redirects.

  • Finding Endpoints for potential open redirect issues.

  • Exploiting rate limiting on API for potential account takeovers and user spamming.

Threat Modeling: Information Disclosure

A variety of vectors were examined, including but not limited to:

  • Exposing sensitive user details via improper API access control

  • Leaking user email or phone numbers through registration or password reset flows

  • Disclosing internal system details via verbose error messages

  • Exposing session tokens or authentication headers in client-side responses

  • Unrestricted access to user transaction history or withdrawal records

  • Improper handling of CORS headers leading to cross-origin data leaks

  • Unauthorized access to user KYC documents or identity verification status

  • Leaking internal referral or commission details through insecure API endpoints

  • Disclosure of backend logic or sensitive configurations via client-side JavaScript

  • Exposing internal logs, debug messages, or admin dashboard endpoints

  • Allowing enumeration of registered users through differences in response behavior

  • Unintended exposure of spot and futures order details through IDOR vulnerabilities

Threat Modeling: Injection Attacks

A variety of vectors were examined, including but not limited to:

  • Injecting malicious scripts into input fields leading to stored or reflected XSS

  • Bypassing input validation to execute unauthorized HTML or JavaScript payloads

  • Exploiting chatbot inputs for potential XSS or HTML injection

System Overview

KCEX is a centralized cryptocurrency trading platform designed to support both spot and futures markets. Users initiate their interaction with the platform by creating an account through a no-KYC registration process, requiring only an email address or phone number. Once registered, users can deposit supported crypto assets into their exchange wallet via blockchain transfers. The platform does not support fiat deposits, so users must onboard with existing cryptocurrencies.

The core of the platform revolves around its trading engine, which facilitates spot trades for direct asset exchanges and perpetual futures contracts for leveraged trading. In the spot market, users can submit buy or sell orders that are matched in real time against other users. For futures trading, users can open long or short positions with leverage up to 100x, using their deposited crypto as margin. The system continuously evaluates positions based on market data to calculate PnL, margin requirements, and liquidation thresholds.

Order management includes limit and market orders, along with advanced trading tools integrated into the trading interface. Each trade updates user balances and is logged for real-time monitoring. The platform also supports internal balance transfers and facilitates withdrawals by broadcasting transactions to the respective blockchain networks. All asset movements and trading operations are handled through clearly defined workflows governed by the trading logic and margin rules.

Additionally, KCEX includes operational logic for promotional programs such as trading bonuses, event-based rewards, and an affiliate system. The affiliate system tracks referrals and distributes a percentage of trading fee rebates to the referrer based on the activity of invited users. These incentive mechanisms are implemented through user activity tracking and conditional logic tied to platform usage metrics. All these components together define the functional and operational boundaries of the KCEX platform.

Key Features Breakdown

  • No-KYC Onboarding: Users can register accounts using only an email or phone number no identity verification required.

  • Crypto-Only Deposits: Users deposit supported cryptocurrencies directly via blockchain transfers; fiat currencies are not supported.

  • Spot Trading Engine: Real-time order matching for direct crypto asset exchanges between users.

  • Futures Trading with Leverage: Perpetual futures contracts available with leverage up to 100x, including margin calculations and liquidation logic.

  • Advanced Order Management: Support for market and limit orders, with integrated trading tools and charting interfaces.

  • Wallet and Fund Transfers: Internal wallet system supports deposits, withdrawals, and balance transfers between users.

  • Incentive Programs: Includes promotional bonuses, volume-based trading rewards, and an affiliate system with automated fee rebate distribution.

Findings

Code
Title
Status
Severity
F-2025-9224Stored Cross-Site Scripting (XSS) in Chatbot Integration
fixed

High
F-2025-9371Registration Restriction Bypass Enables Abuse of Commission Model and Mass Account Creation
accepted

Medium
F-2025-9275Profile Update Restriction Bypass Enabling Excessive Uploads
fixed

Medium
F-2025-9226Missing DMARC Record Enabling Domain Spoofing
fixed

Medium
F-2025-9231Excessive Lockout Duration Leading to Potential Denial of Service
fixed

Medium
F-2025-9375Permissive CORS Misconfiguration with Credential Support
fixed

Low
F-2025-9336Lack of Alerts When Withdrawing Funds to Deactivated Accounts
accepted

Low
F-2025-9227HTML Injection via Insufficient Input Validation
fixed

Low
F-2025-9374Improper Input Handling Enables Potential Injection Attacks
fixed

Low
F-2025-9482Absence of Essential HTTP Security Headers Increasing Potential Risk
fixed

Observation
1-10 of 12 findings

Uncover findings like these to secure your project.

Appendix 1. Severity Definitions

Severity

Description

Critical
These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

High
These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

Medium
These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

Low
These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.
  • Severity

    Critical

    Description

    These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

    Severity

    High

    Description

    These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

    Severity

    Medium

    Description

    These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

    Severity

    Low

    Description

    These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.

Appendix 2. Scope

The scope of the project includes the following assets

Scope Details

Web Applicationhttps://www.kcex.com/
Web APIhttps://api.kcex.com/

Assets in Scope

API - API
Main KCEX Domain - Main KCEX Domain

Disclaimer