Smartadmin Vulnerabilities

Security vulnerability tracking for Lab1024 Smartadmin

Last updated: Mar 8, 2026
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Smartadmin

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-37255.3

This vulnerability allows an attacker to manipulate email templates in the SmartAdmin application, potentially leading to unauthorized actions or information disclosure. The attack can be carried out remotely, and it affects versions up to 3.29 of the software.

lab1024smartadmin
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37215.1

This vulnerability allows an attacker to inject malicious scripts into the Help Documentation Module of the SmartAdmin product, potentially compromising users who view the affected content. The attack can be carried out remotely, and since the exploit is publicly available, it poses a real risk to systems running the affected version.

lab1024smartadmin
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37205.1

This vulnerability allows an attacker to inject malicious scripts into the web application, which can then execute in the browsers of users who visit the affected site. The attack can be launched remotely, meaning the attacker doesn't need physical access to the system, and it affects versions of the software up to 3.29.

lab1024smartadmin
Exploit Available
about 1 month agoMar 8, 2026

About Lab1024 Smartadmin Security

This page provides comprehensive security vulnerability tracking for Lab1024 Smartadmin. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Smartadmin updated to the latest version
  • • Subscribe to security advisories from Lab1024
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately