Description
A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side script execution via XSS in SmartAdmin Help Documentation
Action: Apply Patch
AI Analysis

Impact

A weakness in SmartAdmin’s HelpDocAddForm component enables malicious script injection. The vulnerability is triggered when an attacker crafts input that is rendered in the Help Documentation module, causing browsers of users who view the page to execute the injected code. This can lead to theft of session data, defacement, or further exploitation within the user’s context.

Affected Systems

SmartAdmin versions up to 3.29 from both 1024‑lab and lab1024 are affected. Any installation that includes the Help Documentation module in these releases is vulnerable.

Risk and Exploitability

The CVSS score of 5.1 denotes moderate severity, while the EPSS score of less than 1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Attackers can potentially deliver the payload remotely by sending crafted requests that influence the HelpDocAddForm endpoint, after which legitimate users will become victims when they access the compromised documentation.

Generated by OpenCVE AI on April 17, 2026 at 12:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SmartAdmin to a version newer than 3.29 once the vendor releases a patch.
  • Sanitize all user‑supplied data for the HelpDocAddForm and apply proper output encoding to eliminate the execution of injected scripts.
  • Implement a strict Content Security Policy that disallows inline script execution and limits trusted script sources.

Generated by OpenCVE AI on April 17, 2026 at 12:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:lab1024:smartadmin:*:*:*:*:*:*:*:*

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared 1024-lab
1024-lab smartadmin
Lab1024
Lab1024 smartadmin
Vendors & Products 1024-lab
1024-lab smartadmin
Lab1024
Lab1024 smartadmin

Sun, 08 Mar 2026 07:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title 1024-lab/lab1024 SmartAdmin Help Documentation HelpDocAddForm.java cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

1024-lab Smartadmin
Lab1024 Smartadmin
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T15:31:49.646Z

Reserved: 2026-03-07T12:21:15.830Z

Link: CVE-2026-3721

cve-icon Vulnrichment

Updated: 2026-03-11T15:31:46.988Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T08:16:00.227

Modified: 2026-03-13T15:34:14.747

Link: CVE-2026-3721

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses