CVE-2026-3721

A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.349664 Permissions Required VDB Entry
https://vuldb.com/?id.349664 Third Party Advisory VDB Entry
https://vuldb.com/?submit.765929 Third Party Advisory VDB Entry
https://www.notion.so/SmartAdmin-Stored-Cross-Site-Scripting-XSS-in-HelpDoc-module-310ea92a3c418050852dc554e2b5b49b Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lab1024:smartadmin:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-08 08:16

Updated : 2026-03-13 15:34


NVD link : CVE-2026-3721

Mitre link : CVE-2026-3721

CVE.ORG link : CVE-2026-3721


JSON object : View

Products Affected

lab1024

  • smartadmin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')