๐Ÿ” CVE Alert

CVE-2026-3750

MEDIUM 4.7

ContiNew Admin Storage Management S3ClientFactory.java URI.create server-side request forgery

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

A security vulnerability has been detected in ContiNew Admin up to 4.2.0. This issue affects the function URI.create of the file continew-system/src/main/java/top/continew/admin/system/factory/S3ClientFactory.java of the component Storage Management Module. The manipulation leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-918
Vendor n/a
Product continew admin
Published Mar 8, 2026
Last Updated Mar 11, 2026
Stay Ahead of the Next One

Get instant alerts for n/a continew admin

Be the first to know when new medium vulnerabilities affecting n/a continew admin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / ContiNew Admin
4.0 4.1 4.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.349728 vuldb.com: https://vuldb.com/?ctiid.349728 vuldb.com: https://vuldb.com/?submit.768033 notion.so: https://www.notion.so/ContiNew-Admin-Server-Side-Request-Forgery-SSRF-vulnerability-in-storage-management-module-313ea92a3c4180b897f5e6352906bf1f

Credits

๐Ÿ” din4 (VulDB User) VulDB