Browse all 61 CVE security advisories affecting LambertGroup. AI-powered Chinese analysis, POCs, and references for each vulnerability.
LambertGroup operates primarily as a provider of enterprise resource planning and supply chain management software, facilitating complex logistical operations for mid-to-large-sized organizations. Security audits have identified a significant volume of vulnerabilities, with 61 Common Vulnerabilities and Exposures (CVEs) currently on record, indicating a history of inconsistent patch management or legacy code issues. The most prevalent vulnerability classes affecting their platforms include remote code execution, cross-site scripting, and privilege escalation flaws, which often stem from inadequate input validation and improper access controls. These defects have historically allowed attackers to bypass authentication mechanisms or execute arbitrary commands on affected servers. While no single catastrophic data breach has been publicly attributed solely to LambertGroup, the cumulative nature of these CVEs suggests systemic weaknesses in their software development lifecycle. Organizations utilizing their solutions must prioritize rigorous network segmentation and continuous monitoring to mitigate the risk of exploitation inherent in their current software architecture.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-27002 | WordPress CountDown With Image or Video Background plugin <= 1.5 - Reflected Cross Site Scripting (XSS) vulnerability — CountDown With Image or Video BackgroundCWE-79 | 7.1 | High | 2026-01-08 |
| CVE-2025-68054 | WordPress CountDown With Image or Video Background plugin <= 1.5 - SQL Injection vulnerability — CountDown With Image or Video BackgroundCWE-89 | 8.5 | High | 2025-12-16 |
This page lists every published CVE security advisory associated with LambertGroup. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.