Browse all 4 CVE security advisories affecting Matat Technologies. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Matat Technologies develops industrial control systems and SCADA solutions for critical infrastructure. Their products have historically been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, with four CVEs currently documented. Security researchers have identified authentication bypass flaws and insecure default configurations in their systems. While no major public security incidents have been widely reported, the presence of multiple CVEs suggests potential weaknesses in input validation and access control mechanisms. Their deployment in industrial environments raises concerns about the potential impact of unpatched vulnerabilities on operational technology infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-31789 | WordPress TextMe SMS plugin <= 1.9.1 - Broken Access Control vulnerability — TextMe SMSCWE-862 | 6.5 | Medium | 2025-04-03 |
| CVE-2023-48287 | WordPress TextMe SMS plugin <= 1.9.0 - Broken Access Control vulnerability — TextMe SMSCWE-862 | 5.4 | Medium | 2024-12-09 |
This page lists every published CVE security advisory associated with Matat Technologies. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.