Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
ContiNew Admin 4.2.0: Server-Side Request Forgery via Malicious URI
CVE-2026-3750
Summary
A security flaw in ContiNew Admin versions up to 4.2.0 allows hackers to remotely trick the system into making unauthorized requests. This can lead to sensitive data exposure or other security issues. Update to the latest version of ContiNew Admin to fix this vulnerability.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| continew | continew_admin | <= 4.1.0 | – |
Original title
A security vulnerability has been detected in ContiNew Admin up to 4.2.0. This issue affects the function URI.create of the file continew-system/src/main/java/top/continew/admin/system/factory/S3Cl...
Original description
A security vulnerability has been detected in ContiNew Admin up to 4.2.0. This issue affects the function URI.create of the file continew-system/src/main/java/top/continew/admin/system/factory/S3ClientFactory.java of the component Storage Management Module. The manipulation leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
nvd CVSS2.0
5.8
nvd CVSS3.1
4.7
nvd CVSS4.0
5.1
Vulnerability type
CWE-918
Server-Side Request Forgery (SSRF)
Published: 8 Mar 2026 · Updated: 13 Mar 2026 · First seen: 8 Mar 2026