Wellchoose Vulnerabilities

Comprehensive security vulnerability database for Wellchoose products

Last updated: Mar 11, 2026
Total CVEs

3

Critical

1

With Exploits

3

Last 30 Days

3

Severity Distribution

Critical1
33%
High0
0%
Medium2
67%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-38269.3

This vulnerability allows attackers to run any code they want on the server, which can lead to full control over the system. It can be exploited by anyone without needing to log in, making it especially dangerous for organizations using the affected portal system.

wellchooseorganization portal system
Exploit Available
27 days agoMar 11, 2026
CVE-2026-38255.1

This vulnerability allows attackers to run malicious JavaScript code in a user's browser, potentially stealing sensitive information or hijacking user sessions. To exploit this, the attacker must trick an authenticated user into clicking a specially crafted link, making it a phishing attack.

wellchooseorganization portal system
Exploit Available
27 days agoMar 11, 2026
CVE-2026-38245.1

This vulnerability allows attackers to create deceptive links that can trick users into visiting harmful websites. It requires the attacker to be authenticated in the system, meaning they need valid login credentials to exploit this weakness.

wellchooseorganization portal system
Exploit Available
27 days agoMar 11, 2026

About Wellchoose Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Wellchoose products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.