Vulnerability Description
A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lab1024 | Smartadmin | <= 3.29 |
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.349664Permissions RequiredVDB Entry
- https://vuldb.com/?id.349664Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.765929Third Party AdvisoryVDB Entry
- https://www.notion.so/SmartAdmin-Stored-Cross-Site-Scripting-XSS-in-HelpDoc-moduExploitThird Party Advisory
FAQ
What is CVE-2026-3721?
CVE-2026-3721 is a vulnerability with a CVSS score of 3.5 (LOW). A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domai...
How severe is CVE-2026-3721?
CVE-2026-3721 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3721?
Check the references section above for vendor advisories and patch information. Affected products include: Lab1024 Smartadmin.