A security vulnerability has been detected in ContiNew Admin up to 4.2.0. This issue affects the function URI.create of the file continew-system/src/main/java/top/continew/admin/system/factory/S3ClientFactory.java of the component Storage Management Module. The manipulation leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://vuldb.com/?ctiid.349728 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349728 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.768033 | Third Party Advisory VDB Entry |
| https://www.notion.so/ContiNew-Admin-Server-Side-Request-Forgery-SSRF-vulnerability-in-storage-management-module-313ea92a3c4180b897f5e6352906bf1f | Exploit Third Party Advisory |
Configurations
History
10 Mar 2026, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://vuldb.com/?ctiid.349728 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.349728 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.768033 - Third Party Advisory, VDB Entry | |
| References | () https://www.notion.so/ContiNew-Admin-Server-Side-Request-Forgery-SSRF-vulnerability-in-storage-management-module-313ea92a3c4180b897f5e6352906bf1f - Exploit, Third Party Advisory | |
| Summary |
|
|
| First Time |
Continew continew Admin
Continew |
|
| CPE | cpe:2.3:a:continew:continew_admin:*:*:*:*:*:*:*:* |
08 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-08 17:16
Updated : 2026-03-10 18:57
NVD link : CVE-2026-3750
Mitre link : CVE-2026-3750
CVE.ORG link : CVE-2026-3750
JSON object : View
Products Affected
continew
- continew_admin
CWE
CWE-918
Server-Side Request Forgery (SSRF)
