CVE-2026-3824
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to create deceptive links that can trick users into visiting harmful websites. It requires the attacker to be authenticated in the system, meaning they need valid login credentials to exploit this weakness.
Technical Description
IFTOP developed by WellChoose has an Open redirect vulnerability, allowing authenticated remote attackers to craft a URL that tricks users into visiting malicious website.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 11, 2026
27 days ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
wellchoose
Product
organization portal system
Related Vulnerabilities
This vulnerability allows attackers to run any code they want on the server, which can lead to full control over the system. It can be exploited by anyone without needing to log in, making it especially dangerous for organizations using the affected portal system.
This vulnerability allows attackers to run malicious JavaScript code in a user's browser, potentially stealing sensitive information or hijacking user sessions. To exploit this, the attacker must trick an authenticated user into clicking a specially crafted link, making it a phishing attack.