Company Details
meituan
40,304
280,713
5112
meituan.com
0
MEI_3198551
In-progress


Meituan Company CyberSecurity Posture
meituan.comAdhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we provide quality services for consumers. On 20 September, 2018, Meituan was listed on the Main Board of the Stock Exchange of Hong Kong. Meituan has always put customers first, and continuously increased its R&D investment in new technologies. Meituan will join hands with all partners to fulfill our social responsibility and create more values for the society.
Company Details
meituan
40,304
280,713
5112
meituan.com
0
MEI_3198551
In-progress
Between 750 and 799

Meituan Global Score (TPRM)XXXX

Description: Meituan Dianping, the internet giant backed by China’s most valuable tech corporation, has faced a data breach that exposed the private information of tens of thousands of users. The potential breach comes as revelations about leaks at Facebook spur a regulatory and consumer backlash against internet companies around the globe. In Meituan’s case, allegedly tens of thousands of data snippets, everything from names and mobile numbers to home addresses, on food-delivery customers went on sale online for as little as 0.1 yuan (2 US cents) per item. Because of the multiple parties involved in food delivery, such as merchants and third-party delivery services, some unlawful participants might have been able to gain access to information.


No incidents recorded for Meituan in 2026.
No incidents recorded for Meituan in 2026.
No incidents recorded for Meituan in 2026.
Meituan cyber incidents detection timeline including parent company and subsidiaries

Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we provide quality services for consumers. On 20 September, 2018, Meituan was listed on the Main Board of the Stock Exchange of Hong Kong. Meituan has always put customers first, and continuously increased its R&D investment in new technologies. Meituan will join hands with all partners to fulfill our social responsibility and create more values for the society.


UKG is the Workforce Operating Platform that puts workforce understanding to work. With the world's largest collection of workforce insights, and people-first AI, our ability to reveal unseen ways to build trust, amplify productivity, and empower talent, is unmatched. It's this expertise that equips
A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we c
Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m

Just Eat Takeaway.com is a leading global online delivery marketplace, connecting consumers and restaurants through our platform in 17 countries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a

Founded in 1998, Oracle NetSuite is the world’s first cloud company. For more than 25 years, NetSuite has helped businesses gain the insight, control, and agility to build and grow a successful business. First focused on financials and ERP, we now provide an AI-powered unified business system that

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

Thomson Reuters (TSX/NDAQ: TRI) informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly special

Cox Automotive is the world’s largest automotive services and technology provider. Fueled by the largest breadth of first-party data fed by 2.3 billion online interactions a year, Cox Automotive tailors leading solutions for car shoppers, auto manufacturers, dealers, lenders and fleets. The company

Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite their siloed data, easily discover and securely share governed data, and execute diverse analy
.png)
Meituan has launched a new AI agent app that aims to boost its food delivery and local services business, as its battle with Alibaba Group...
The latest investor updates on stocks that are trending on Thursday.
Alibaba sees rapid growth for 'instant' commerce service that uses food-delivery network to deliver items within 60 minutes.
Visitors to the Badaling section of the Great Wall of China have been able to order food and emergency supplies using the Meituan platform.
Chinese food delivery giant Meituan expands livestreaming to attract consumers in face of competition from TikTok sister site Douyin.
Meituan, the Chinese food delivery firm, plans to hire 10,000 workers in the first quarter of 2023 as the "consumption recovery trend" in...
A pair of Steve Jobs's old Birkenstocks sold for nearly $220000 at auction this week. But first...
A number of tech giants – including Meituan, Huawei and Tencent's WeChat – have been investing heavily in their ride-hailing platforms, in a...
China's cybersecurity regulator on Thursday fined Didi Global Inc $1.2 billion, concluding a probe that forced the ride-hailing leader to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Meituan is https://www.meituan.com/en-US/about-us.
According to Rankiteo, Meituan’s AI-generated cybersecurity score is 779, reflecting their Fair security posture.
According to Rankiteo, Meituan currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Meituan has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Meituan is not certified under SOC 2 Type 1.
According to Rankiteo, Meituan does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Meituan is not listed as GDPR compliant.
According to Rankiteo, Meituan does not currently maintain PCI DSS compliance.
According to Rankiteo, Meituan is not compliant with HIPAA regulations.
According to Rankiteo,Meituan is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Meituan operates primarily in the Software Development industry.
Meituan employs approximately 40,304 people worldwide.
Meituan presently has no subsidiaries across any sectors.
Meituan’s official LinkedIn profile has approximately 280,713 followers.
Meituan is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Meituan does not have a profile on Crunchbase.
Yes, Meituan maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/meituan.
As of January 21, 2026, Rankiteo reports that Meituan has experienced 1 cybersecurity incidents.
Meituan has an estimated 28,125 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Data Breach at Meituan Dianping
Description: Meituan Dianping, the internet giant backed by China’s most valuable tech corporation, has faced a data breach that exposed the private information of tens of thousands of users. The potential breach comes as revelations about leaks at Facebook spur a regulatory and consumer backlash against internet companies around the globe. In Meituan’s case, allegedly tens of thousands of data snippets, everything from names and mobile numbers to home addresses, on food-delivery customers went on sale online for as little as 0.1 yuan (2 US cents) per item. Because of the multiple parties involved in food delivery, such as merchants and third-party delivery services, some unlawful participants might have been able to gain access to information.
Type: Data Breach
Motivation: Financial
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Names, Mobile numbers, Home addresses
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Mobile Numbers, Home Addresses and .

Entity Name: Meituan Dianping
Entity Type: Company
Industry: Food Delivery
Location: China
Customers Affected: Tens of thousands

Type of Data Compromised: Names, Mobile numbers, Home addresses
Number of Records Exposed: Tens of thousands
Sensitivity of Data: High
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Mobile Numbers, Home Addresses and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Mobile Numbers, Names and Home Addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.