Comparison Overview

Bath & Body Works

VS

L Brands

Bath & Body Works

Columbus, Ohio, US, 43068
Last Update: 2025-12-09

We were founded on a simple idea: to make the world a brighter, happier place through the power of fragrance. As we've grown, so has our purpose and today, we help the world live more fully through the power of fragrance. We’re a team that cares about our customers and believes in giving them a reason to celebrate with fragrance every day. We are committed to creating a welcoming culture that is focused on delivering exceptional fragrances and experiences. We work hard to improve our communities and our planet in a way that will make us proud for years to come ... because we believe the world is a better place when everyone has access to the things that make them happy. Home of America’s Favorite Fragrances®, Bath & Body Works is a global leader in personal care and home fragrance, including the top-selling collections for fine fragrance mist, body lotion and body cream, 3-wick candles, home fragrance diffusers and liquid hand soap. Powered by agility and innovation, the company’s predominantly U.S.-based supply chain enables the company to deliver quality, on-trend luxuries at affordable prices. Bath & Body Works serves and delights customers however and wherever they want to shop, from welcoming, in-store experiences at more than 1,800 company-operated Bath & Body Works locations in the U.S. and Canada and more than 425 international franchised locations to an online storefront at www.BathandBodyWorks.com.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 32,557
Subsidiaries: 1
12-month incidents
0
Known data breaches
1
Attack type number
1

L Brands

3 Limited Parkway, Columbus, OH, 43230, US
Last Update: 2025-12-09
Between 750 and 799

On August 2, 2021, L Brands (NYSE: LB) completed the separation of the Victoria’s Secret business into an independent, public company through a tax-free spin-off to L Brands shareholders. The new company, named Victoria’s Secret & Co., includes Victoria’s Secret Lingerie, PINK and Victoria’s Secret Beauty. Victoria’s Secret & Co. is a NYSE listed company trading under the ticker symbol VSCO. In conjunction with this announcement, L Brands changed its name to Bath & Body Works, Inc. and now trades under the ticker symbol BBWI. For more information on Bath & Body Works, Inc. or Victoria’s Secret & Co., please visit the corporate websites.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 10,154
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bath-and-body-works.jpeg
Bath & Body Works
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/limited-brands.jpeg
L Brands
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Bath & Body Works
100%
Compliance Rate
0/4 Standards Verified
L Brands
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Bath & Body Works in 2025.

Incidents vs Retail Industry Average (This Year)

No incidents recorded for L Brands in 2025.

Incident History — Bath & Body Works (X = Date, Y = Severity)

Bath & Body Works cyber incidents detection timeline including parent company and subsidiaries

Incident History — L Brands (X = Date, Y = Severity)

L Brands cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bath-and-body-works.jpeg
Bath & Body Works
Incidents

Date Detected: 6/2021
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/limited-brands.jpeg
L Brands
Incidents

No Incident

FAQ

L Brands company demonstrates a stronger AI Cybersecurity Score compared to Bath & Body Works company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Bath & Body Works company has historically faced a number of disclosed cyber incidents, whereas L Brands company has not reported any.

In the current year, L Brands company and Bath & Body Works company have not reported any cyber incidents.

Neither L Brands company nor Bath & Body Works company has reported experiencing a ransomware attack publicly.

Bath & Body Works company has disclosed at least one data breach, while the other L Brands company has not reported such incidents publicly.

Neither L Brands company nor Bath & Body Works company has reported experiencing targeted cyberattacks publicly.

Neither Bath & Body Works company nor L Brands company has reported experiencing or disclosing vulnerabilities publicly.

Neither Bath & Body Works nor L Brands holds any compliance certifications.

Neither company holds any compliance certifications.

L Brands company has more subsidiaries worldwide compared to Bath & Body Works company.

Bath & Body Works company employs more people globally than L Brands company, reflecting its scale as a Retail.

Neither Bath & Body Works nor L Brands holds SOC 2 Type 1 certification.

Neither Bath & Body Works nor L Brands holds SOC 2 Type 2 certification.

Neither Bath & Body Works nor L Brands holds ISO 27001 certification.

Neither Bath & Body Works nor L Brands holds PCI DSS certification.

Neither Bath & Body Works nor L Brands holds HIPAA certification.

Neither Bath & Body Works nor L Brands holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X