Browse all 4 CVE security advisories affecting Chargemap. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Chargemap operates as an electric vehicle charging station platform connecting drivers with charging networks globally. Historically, the platform has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues across its web and mobile interfaces. These vulnerabilities often stemmed from improper input validation and insufficient access controls in charging station management systems. While no major public security incidents have been widely reported, the presence of four CVEs indicates ongoing security challenges in a rapidly growing IoT-connected infrastructure. The platform's reliance on third-party integrations and physical charging infrastructure presents additional attack surfaces requiring continuous security assessment.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-20791 | Chargemap chargemap.com Insufficiently Protected Credentials — chargemap.comCWE-522 | 6.5 | Medium | 2026-02-26 |
| CVE-2026-25711 | Chargemap chargemap.com Insufficient Session Expiration — chargemap.comCWE-613 | 7.3 | High | 2026-02-26 |
| CVE-2026-20792 | Chargemap chargemap.com Improper Restriction of Excessive Authentication Attempts — chargemap.comCWE-307 | 7.5 | High | 2026-02-26 |
| CVE-2026-25851 | Chargemap chargemap.com Missing Authentication for Critical Function — chargemap.comCWE-306 | 9.4 | Critical | 2026-02-26 |
This page lists every published CVE security advisory associated with Chargemap. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.