Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we provide quality services for consumers. On 20 September, 2018, Meituan was listed on the Main Board of the Stock Exchange of Hong Kong. Meituan has always put customers first, and continuously increased its R&D investment in new technologies. Meituan will join hands with all partners to fulfill our social responsibility and create more values for the society.

Meituan A.I CyberSecurity Scoring

Meituan

Company Details

Linkedin ID:

meituan

Employees number:

40,304

Number of followers:

280,713

NAICS:

5112

Industry Type:

Software Development

Homepage:

meituan.com

IP Addresses:

0

Company ID:

MEI_3198551

Scan Status:

In-progress

AI scoreMeituan Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/meituan.jpeg
Meituan Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMeituan Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/meituan.jpeg
Meituan Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Meituan Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
MeituanData Leak85405/2018NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Meituan Dianping, the internet giant backed by China’s most valuable tech corporation, has faced a data breach that exposed the private information of tens of thousands of users. The potential breach comes as revelations about leaks at Facebook spur a regulatory and consumer backlash against internet companies around the globe. In Meituan’s case, allegedly tens of thousands of data snippets, everything from names and mobile numbers to home addresses, on food-delivery customers went on sale online for as little as 0.1 yuan (2 US cents) per item. Because of the multiple parties involved in food delivery, such as merchants and third-party delivery services, some unlawful participants might have been able to gain access to information.

Meituan
Data Leak
Severity: 85
Impact: 4
Seen: 05/2018
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Meituan Dianping, the internet giant backed by China’s most valuable tech corporation, has faced a data breach that exposed the private information of tens of thousands of users. The potential breach comes as revelations about leaks at Facebook spur a regulatory and consumer backlash against internet companies around the globe. In Meituan’s case, allegedly tens of thousands of data snippets, everything from names and mobile numbers to home addresses, on food-delivery customers went on sale online for as little as 0.1 yuan (2 US cents) per item. Because of the multiple parties involved in food delivery, such as merchants and third-party delivery services, some unlawful participants might have been able to gain access to information.

Ailogo

Meituan Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Meituan

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Meituan in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Meituan in 2026.

Incident Types Meituan vs Software Development Industry Avg (This Year)

No incidents recorded for Meituan in 2026.

Incident History — Meituan (X = Date, Y = Severity)

Meituan cyber incidents detection timeline including parent company and subsidiaries

Meituan Company Subsidiaries

SubsidiaryImage

Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we provide quality services for consumers. On 20 September, 2018, Meituan was listed on the Main Board of the Stock Exchange of Hong Kong. Meituan has always put customers first, and continuously increased its R&D investment in new technologies. Meituan will join hands with all partners to fulfill our social responsibility and create more values for the society.

Loading...
similarCompanies

Meituan Similar Companies

About KPIT KPIT is reimagining the future of mobility, forging ahead with group companies and partners to shape a world that is cleaner, smarter, and safer. With over 25 years of specialized expertise in Mobility, KPIT is accelerating the transformation towards Software and AI-Defined Vehicles thr

Wolt is a Helsinki-based technology company with a mission to bring joy, simplicity and earnings to the neighborhoods of the world. Wolt develops a local commerce platform that connects people looking to order food, groceries, and other goods with people interested in selling and delivering them. Wo

Snowflake

Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite their siloed data, easily discover and securely share governed data, and execute diverse analy

Trimble Inc.

Trimble is a global technology company that connects the physical and digital worlds, transforming the ways work gets done. With relentless innovation in precise positioning, modeling and data analytics, Trimble enables essential industries including construction, geospatial and transportation. Whet

Airbnb

Airbnb was born in 2007 when two hosts welcomed three guests to their San Francisco home, and has since grown to over 5 million hosts who have welcomed over 2 billion guest arrivals in almost every country across the globe. Every day, hosts offer unique stays, experiences and services that make it p

Wolters Kluwer

Wolters Kluwer (EURONEXT: WKL) is a global leader in information, software solutions, and services for professionals in healthcare; tax and accounting; financial and corporate compliance; legal and regulatory; corporate performance and ESG. We help our customers make critical decisions every day by

HubSpot

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th

Just Eat Takeaway.com

Just Eat Take​away​.com is a lead­ing glob­al online deliv­ery mar­ket­place, con­nect­ing con­sumers and restau­rants through our plat­form in 17 coun­tries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a

[24]7.ai

[24]7.ai™ customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a

newsone

Meituan CyberSecurity News

September 12, 2025 07:00 AM
Meituan launches AI agent to boost food delivery business

Meituan has launched a new AI agent app that aims to boost its food delivery and local services business, as its battle with Alibaba Group...

August 28, 2025 07:00 AM
Trending tickers: Nvidia, CrowdStrike, Snowflake, Meituan and Delivery Hero

The latest investor updates on stocks that are trending on Thursday.

July 08, 2025 07:00 AM
Alibaba Instant Commerce Reaches 200 Million Daily Users

Alibaba sees rapid growth for 'instant' commerce service that uses food-delivery network to deliver items within 60 minutes.

August 23, 2024 07:00 AM
Drones deliver takeout, emergency kits to Great Wall of China

Visitors to the Badaling section of the Great Wall of China have been able to order food and emergency supplies using the Meituan platform.

July 18, 2023 07:00 AM
China Delivery Giant Meituan Expands Livestream Commerce

Chinese food delivery giant Meituan expands livestreaming to attract consumers in face of competition from TikTok sister site Douyin.

February 11, 2023 08:00 AM
Meituan announces plans to hire 10,000 workers in Q1 as Chinese economy recovers

Meituan, the Chinese food delivery firm, plans to hire 10,000 workers in the first quarter of 2023 as the "consumption recovery trend" in...

November 17, 2022 08:00 AM
How Much Would You Pay to Walk in Steve Jobs’s Birkenstocks?

A pair of Steve Jobs's old Birkenstocks sold for nearly $220000 at auction this week. But first...

August 14, 2022 07:00 AM
As Didi stumbles, tech giants race to grab China’s ride-hailing market

A number of tech giants – including Meituan, Huawei and Tencent's WeChat – have been investing heavily in their ride-hailing platforms, in a...

July 21, 2022 07:00 AM
China fines Didi $1.2 bln but outlook clouded by app relaunch uncertainty

China's cybersecurity regulator on Thursday fined Didi Global Inc $1.2 billion, concluding a probe that forced the ride-hailing leader to...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Meituan CyberSecurity History Information

Official Website of Meituan

The official website of Meituan is https://www.meituan.com/en-US/about-us.

Meituan’s AI-Generated Cybersecurity Score

According to Rankiteo, Meituan’s AI-generated cybersecurity score is 779, reflecting their Fair security posture.

How many security badges does Meituan’ have ?

According to Rankiteo, Meituan currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Meituan been affected by any supply chain cyber incidents ?

According to Rankiteo, Meituan has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Meituan have SOC 2 Type 1 certification ?

According to Rankiteo, Meituan is not certified under SOC 2 Type 1.

Does Meituan have SOC 2 Type 2 certification ?

According to Rankiteo, Meituan does not hold a SOC 2 Type 2 certification.

Does Meituan comply with GDPR ?

According to Rankiteo, Meituan is not listed as GDPR compliant.

Does Meituan have PCI DSS certification ?

According to Rankiteo, Meituan does not currently maintain PCI DSS compliance.

Does Meituan comply with HIPAA ?

According to Rankiteo, Meituan is not compliant with HIPAA regulations.

Does Meituan have ISO 27001 certification ?

According to Rankiteo,Meituan is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Meituan

Meituan operates primarily in the Software Development industry.

Number of Employees at Meituan

Meituan employs approximately 40,304 people worldwide.

Subsidiaries Owned by Meituan

Meituan presently has no subsidiaries across any sectors.

Meituan’s LinkedIn Followers

Meituan’s official LinkedIn profile has approximately 280,713 followers.

NAICS Classification of Meituan

Meituan is classified under the NAICS code 5112, which corresponds to Software Publishers.

Meituan’s Presence on Crunchbase

No, Meituan does not have a profile on Crunchbase.

Meituan’s Presence on LinkedIn

Yes, Meituan maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/meituan.

Cybersecurity Incidents Involving Meituan

As of January 21, 2026, Rankiteo reports that Meituan has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Meituan has an estimated 28,125 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Meituan ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Meituan Dianping

Description: Meituan Dianping, the internet giant backed by China’s most valuable tech corporation, has faced a data breach that exposed the private information of tens of thousands of users. The potential breach comes as revelations about leaks at Facebook spur a regulatory and consumer backlash against internet companies around the globe. In Meituan’s case, allegedly tens of thousands of data snippets, everything from names and mobile numbers to home addresses, on food-delivery customers went on sale online for as little as 0.1 yuan (2 US cents) per item. Because of the multiple parties involved in food delivery, such as merchants and third-party delivery services, some unlawful participants might have been able to gain access to information.

Type: Data Breach

Motivation: Financial

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach MEI231827722

Data Compromised: Names, Mobile numbers, Home addresses

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Mobile Numbers, Home Addresses and .

Which entities were affected by each incident ?

Incident : Data Breach MEI231827722

Entity Name: Meituan Dianping

Entity Type: Company

Industry: Food Delivery

Location: China

Customers Affected: Tens of thousands

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach MEI231827722

Type of Data Compromised: Names, Mobile numbers, Home addresses

Number of Records Exposed: Tens of thousands

Sensitivity of Data: High

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Mobile Numbers, Home Addresses and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Mobile Numbers, Names and Home Addresses.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=meituan' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge