CVE-2026-3720
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into the web application, which can then execute in the browsers of users who visit the affected site. The attack can be launched remotely, meaning the attacker doesn't need physical access to the system, and it affects versions of the software up to 3.29.
Technical Description
A security flaw has been discovered in 1024-lab/lab1024 SmartAdmin up to 3.29. Impacted is an unknown function of the file smart-admin-web-javascript/src/views/business/oa/notice/components/notice-form-drawer.vue of the component Notice Module. The manipulation results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
lab1024
Product
smartadmin
Related Vulnerabilities
This vulnerability allows an attacker to manipulate email templates in the SmartAdmin application, potentially leading to unauthorized actions or information disclosure. The attack can be carried out remotely, and it affects versions up to 3.29 of the software.
This vulnerability allows an attacker to inject malicious scripts into the Help Documentation Module of the SmartAdmin product, potentially compromising users who view the affected content. The attack can be carried out remotely, and since the exploit is publicly available, it poses a real risk to systems running the affected version.