Browse all 3 CVE security advisories affecting matomoteam. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Matomoteam develops open-source monitoring and observability solutions, primarily focused on system performance metrics and log aggregation. Their products have historically been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and authentication flaws. The team has addressed multiple CVEs in their software stack, with some instances allowing unauthorized access to sensitive monitoring data. While no major public security incidents have been documented, their consistent vulnerability pattern suggests a need for enhanced security testing in their development lifecycle.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-38766 | WordPress Matomo Analytics plugin <= 5.1.1 - Cross Site Request Forgery (CSRF) leading to Notice Dismissal vulnerability — Matomo AnalyticsCWE-352 | 4.3 | Medium | 2025-01-02 |
| CVE-2023-6923 | Matomo <= 4.15.3 - Reflected Cross-Site Scripting via idsite — Matomo Analytics – Powerful, Privacy-First Insights for WordPressCWE-79 | 6.1 | Medium | 2024-02-20 |
| CVE-2023-4774 | WP-Matomo Integration (WP-Piwik) <= 1.0.28 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode — Connect Matomo – Analytics Dashboard for WordPressCWE-79 | 6.4 | Medium | 2023-09-22 |
This page lists every published CVE security advisory associated with matomoteam. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.