CVE-2026-3826
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to run any code they want on the server, which can lead to full control over the system. It can be exploited by anyone without needing to log in, making it especially dangerous for organizations using the affected portal system.
Technical Description
IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 11, 2026
27 days ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
wellchoose
Product
organization portal system
Related Vulnerabilities
This vulnerability allows attackers to run malicious JavaScript code in a user's browser, potentially stealing sensitive information or hijacking user sessions. To exploit this, the attacker must trick an authenticated user into clicking a specially crafted link, making it a phishing attack.
This vulnerability allows attackers to create deceptive links that can trick users into visiting harmful websites. It requires the attacker to be authenticated in the system, meaning they need valid login credentials to exploit this weakness.