Sz-boot-parent Vulnerabilities

Security vulnerability tracking for Szadmin Sz-boot-parent

Last updated: Feb 25, 2026
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Sz-boot-parent

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-31875.3

This vulnerability allows an attacker to upload any type of file to a specific API endpoint, which could lead to malicious files being executed on the server. The attack can be carried out remotely, and it affects versions up to 1.3.2-beta, so it's important to upgrade to the latest version to fix the issue.

szadminsz-boot-parent
Exploit Available
about 1 month agoFeb 25, 2026
CVE-2026-31865.3

An attacker can remotely reset user passwords to a default value by manipulating a specific function in the application, potentially gaining unauthorized access to user accounts. This vulnerability affects versions up to 1.3.2-beta, and it has been publicly disclosed, so it's crucial to upgrade to version 1.3.3-beta to fix the issue.

szadminsz-boot-parent
Exploit Available
about 1 month agoFeb 25, 2026
CVE-2026-31855.5

An attacker can bypass authorization and access or manipulate messages that do not belong to them through a specific API endpoint. This vulnerability affects versions up to 1.3.2-beta and can be exploited remotely, so it's crucial to upgrade to version 1.3.3-beta to fix the issue.

szadminsz-boot-parent
Exploit Available
about 1 month agoFeb 25, 2026

About Szadmin Sz-boot-parent Security

This page provides comprehensive security vulnerability tracking for Szadmin Sz-boot-parent. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Sz-boot-parent updated to the latest version
  • • Subscribe to security advisories from Szadmin
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately