CVE-2026-3826
Published: 11 March 2026
Summary
CVE-2026-3826 is a critical-severity PHP Remote File Inclusion (CWE-98) vulnerability in Wellchoose Organization Portal System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 46.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents LFI exploitation by validating and sanitizing user-supplied file paths before inclusion in IFTOP.
Requires timely patching of the specific LFI vulnerability in IFTOP to eliminate the flaw enabling arbitrary code execution.
Enforces least privilege to limit the damage from arbitrary code execution achieved via the LFI vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The LFI vulnerability in the network monitoring tool IFTOP allows unauthenticated remote attackers to achieve arbitrary code execution over the network, directly mapping to exploitation of a public-facing application.
NVD Description
IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.
Deeper analysisAI
CVE-2026-3826 is a Local File Inclusion (LFI) vulnerability, classified under CWE-98, in IFTOP, a network monitoring tool developed by WellChoose. Published on 2026-03-11, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, user interaction, or special conditions. Successful exploitation enables arbitrary code execution on the server, compromising confidentiality, integrity, and availability to a high degree.
Mitigation guidance is available in advisories from Taiwan's CERT, including https://www.twcert.org.tw/en/cp-139-10756-73f66-2.html and https://www.twcert.org.tw/tw/cp-132-10755-94136-1.html.
Details
- CWE(s)