CVE-2026-3721
Received Received - Intake
Cross-Site Scripting in 1024-lab SmartAdmin Help Module

Publication date: 2026-03-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lab1024 smartadmin to 3.29 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3721 is a Stored Cross-Site Scripting (XSS) vulnerability in the Help Documentation module of the 1024-lab SmartAdmin platform, affecting versions up to 3.29.

The vulnerability occurs because attackers can submit malicious HTML content containing JavaScript code through backend API interfaces, bypassing frontend filtering mechanisms.

When regular users access the compromised help documentation, the injected malicious script executes in their browsers, potentially leading to unauthorized actions or data exposure.

This issue is linked to the HelpDocAddForm.java component within the Help Documentation module.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to inject malicious scripts that execute in the browsers of users who view the affected help documentation.

Such script execution can lead to unauthorized actions, data exposure, or manipulation within the context of the affected application.

The attack can be initiated remotely and requires user interaction, making it a risk for users accessing the compromised content.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves stored cross-site scripting (XSS) in the Help Documentation module of 1024-lab SmartAdmin, where malicious scripts can be injected via backend API interfaces and executed in users' browsers."}, {'type': 'paragraph', 'content': 'Detection can focus on monitoring HTTP requests and responses related to the Help Documentation module, especially those involving submission or retrieval of help documentation content.'}, {'type': 'paragraph', 'content': 'Suggested commands include using network traffic inspection tools like curl or wget to fetch help documentation pages and check for suspicious script tags or injected JavaScript code.'}, {'type': 'list_item', 'content': "Use curl to retrieve help documentation pages and inspect for injected scripts: curl -s http://<target>/helpdoc | grep -i '<script>'"}, {'type': 'list_item', 'content': 'Monitor HTTP POST requests to the backend API endpoints that handle help documentation submissions for suspicious payloads containing JavaScript.'}, {'type': 'list_item', 'content': 'Use web vulnerability scanners that support XSS detection against the affected module URLs.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

There are no known patches or vendor-provided mitigations for this vulnerability as the vendor did not respond to the disclosure.

Immediate mitigation steps include restricting access to the Help Documentation module to trusted users only and monitoring for suspicious activity.

Consider disabling or removing the affected Help Documentation component if possible to prevent exploitation.

Implement web application firewall (WAF) rules to detect and block common XSS attack patterns targeting the affected endpoints.

Evaluate replacing the affected component or the entire product with an alternative that does not contain this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart