Wellchoose Vulnerabilities
Comprehensive security vulnerability database for Wellchoose products
3
1
3
3
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3826 | 9.3 | This vulnerability allows attackers to run any code they want on the server, which can lead to full control over the system. It can be exploited by anyone without needing to log in, making it especially dangerous for organizations using the affected portal system. | wellchooseorganization portal system | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-3825 | 5.1 | This vulnerability allows attackers to run malicious JavaScript code in a user's browser, potentially stealing sensitive information or hijacking user sessions. To exploit this, the attacker must trick an authenticated user into clicking a specially crafted link, making it a phishing attack. | wellchooseorganization portal system | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-3824 | 5.1 | This vulnerability allows attackers to create deceptive links that can trick users into visiting harmful websites. It requires the attacker to be authenticated in the system, meaning they need valid login credentials to exploit this weakness. | wellchooseorganization portal system | Exploit Available | 27 days agoMar 11, 2026 |
About Wellchoose Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Wellchoose products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.