Browse all 5 CVE security advisories affecting AmentoTech Private Limited. AI-powered Chinese analysis, POCs, and references for each vulnerability.
AmentoTech Private Limited develops enterprise software solutions with a focus on financial technology applications. The company has five CVEs on record, historically vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws. Their products often contain insufficient input validation and insecure default configurations. While no major public security incidents have been documented, their vulnerability history suggests consistent issues with authentication mechanisms and session management. The company's security posture appears reactive rather than preventive, with patches typically released only after vulnerabilities are publicly disclosed. Their codebase would benefit from implementing secure development practices and regular security assessments to address these recurring issues.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-49910 | WordPress WPGuppy plugin <= 1.1.4 - Broken Access Control vulnerability — WPGuppyCWE-862 | 8.2 | High | 2025-10-22 |
| CVE-2025-30775 | WordPress WPGuppy plugin <= 1.1.3 - SQL Injection vulnerability — WPGuppyCWE-89 | 8.5 | High | 2025-03-27 |
| CVE-2025-24643 | WordPress WPGuppy plugin <= 1.1.0 - Broken Authentication vulnerability — WPGuppyCWE-862 | 6.5 | Medium | 2025-02-03 |
| CVE-2024-49222 | WordPress WPGuppy plugin <= 1.1.0 - PHP Object Injection vulnerability — WPGuppyCWE-502 | 9.8 | Critical | 2025-01-07 |
| CVE-2024-56280 | WordPress WPGuppy plugin <= 1.1.0 - Privilege Escalation vulnerability — WPGuppyCWE-266 | 8.8 | High | 2025-01-07 |
This page lists every published CVE security advisory associated with AmentoTech Private Limited. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.