Browse all 4 CVE security advisories affecting CloudCharge. AI-powered Chinese analysis, POCs, and references for each vulnerability.
CloudCharge provides electric vehicle charging station management and payment processing solutions. Historically, the platform has been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from insufficient input validation and improper access controls. While no major public incidents have been documented, the four recorded CVEs highlight persistent security concerns in web interfaces and API endpoints. The company's security posture appears reactive rather than preventive, with vulnerabilities concentrated in authentication mechanisms and customer-facing web components. Organizations implementing CloudCharge should prioritize patch management and network segmentation to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-20733 | CloudCharge cloudcharge.se Insufficiently Protected Credentials — cloudcharge.seCWE-522 | 6.5 | Medium | 2026-02-26 |
| CVE-2026-27652 | CloudCharge cloudcharge.se Insufficient Session Expiration — cloudcharge.seCWE-613 | 7.3 | High | 2026-02-26 |
| CVE-2026-25114 | CloudCharge cloudcharge.se Improper Restriction of Excessive Authentication Attempts — cloudcharge.seCWE-307 | 7.5 | High | 2026-02-26 |
| CVE-2026-20781 | CloudCharge cloudcharge.se Missing Authentication for Critical Function — cloudcharge.seCWE-306 | 9.4 | Critical | 2026-02-26 |
This page lists every published CVE security advisory associated with CloudCharge. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.