CVE-2026-3721
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into the Help Documentation Module of the SmartAdmin product, potentially compromising users who view the affected content. The attack can be carried out remotely, and since the exploit is publicly available, it poses a real risk to systems running the affected version.
Technical Description
A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 13, 2026
26 days ago
Vendor
lab1024
Product
smartadmin
Related Vulnerabilities
This vulnerability allows an attacker to manipulate email templates in the SmartAdmin application, potentially leading to unauthorized actions or information disclosure. The attack can be carried out remotely, and it affects versions up to 3.29 of the software.
This vulnerability allows an attacker to inject malicious scripts into the web application, which can then execute in the browsers of users who visit the affected site. The attack can be launched remotely, meaning the attacker doesn't need physical access to the system, and it affects versions of the software up to 3.29.