{"api_version":"1","generated_at":"2026-04-30T16:04:52+00:00","cve":"CVE-2026-3725","urls":{"html":"https://cve.report/CVE-2026-3725","api":"https://cve.report/api/cve/CVE-2026-3725.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-3725","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-3725"},"summary":{"title":"1024-lab/lab1024 SmartAdmin FreeMarker Template MailService.java freemarkerResolverContent special elements used in a template engine","description":"A flaw has been found in 1024-lab/lab1024 SmartAdmin up to 3.29. Affected by this issue is the function freemarkerResolverContent of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/mail/MailService.java of the component FreeMarker Template Handler. Executing a manipulation of the argument template_content can lead to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-03-08 09:16:18","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-791","CWE-1336","CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine","CWE-791 Incomplete Filtering of Special Elements"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"2.1","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"6.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"6.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"6.3","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"6.5","severity":"","vector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"6.5","severity":"","vector":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://vuldb.com/?id.349703","name":"https://vuldb.com/?id.349703","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.349703","name":"https://vuldb.com/?ctiid.349703","refsource":"cna@vuldb.com","tags":["Permissions Required","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.notion.so/SmartAdmin-Server-Side-Template-Injection-SSTI-in-Email-Template-Rendering-310ea92a3c418087ac63ec8e5a061b62","name":"https://www.notion.so/SmartAdmin-Server-Side-Template-Injection-SSTI-in-Email-Template-Rendering-310ea92a3c418087ac63ec8e5a061b62","refsource":"cna@vuldb.com","tags":["Exploit","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?submit.766459","name":"https://vuldb.com/?submit.766459","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-3725","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3725","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.0","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.1","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.2","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.3","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.4","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.5","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.6","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.7","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.8","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.9","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.10","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.11","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.12","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.13","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.14","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.15","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.16","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.17","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.18","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.19","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.20","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.21","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.22","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.23","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.24","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.25","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.26","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.27","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.28","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"SmartAdmin","version":"affected 3.29","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.0","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.1","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.2","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.3","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.4","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.5","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.6","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.7","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.8","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.9","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.10","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.11","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.12","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.13","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.14","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.15","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.16","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.17","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.18","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.19","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.20","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.21","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.22","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.23","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.24","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.25","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.26","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.27","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.28","platforms":[]},{"source":"CNA","vendor":"lab1024","product":"SmartAdmin","version":"affected 3.29","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-03-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-03-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-03-07T18:47:28.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"din4 (VulDB User)","lang":"en"},{"source":"CNA","value":"VulDB","lang":"en"}],"nvd_cpes":[{"cve_year":"2026","cve_id":"3725","vulnerable":"1","versionEndIncluding":"3.29","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lab1024","cpe5":"smartadmin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-3725","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-11T15:32:38.762258Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-11T15:32:45.478Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"modules":["FreeMarker Template Handler"],"product":"SmartAdmin","vendor":"1024-lab","versions":[{"status":"affected","version":"3.0"},{"status":"affected","version":"3.1"},{"status":"affected","version":"3.2"},{"status":"affected","version":"3.3"},{"status":"affected","version":"3.4"},{"status":"affected","version":"3.5"},{"status":"affected","version":"3.6"},{"status":"affected","version":"3.7"},{"status":"affected","version":"3.8"},{"status":"affected","version":"3.9"},{"status":"affected","version":"3.10"},{"status":"affected","version":"3.11"},{"status":"affected","version":"3.12"},{"status":"affected","version":"3.13"},{"status":"affected","version":"3.14"},{"status":"affected","version":"3.15"},{"status":"affected","version":"3.16"},{"status":"affected","version":"3.17"},{"status":"affected","version":"3.18"},{"status":"affected","version":"3.19"},{"status":"affected","version":"3.20"},{"status":"affected","version":"3.21"},{"status":"affected","version":"3.22"},{"status":"affected","version":"3.23"},{"status":"affected","version":"3.24"},{"status":"affected","version":"3.25"},{"status":"affected","version":"3.26"},{"status":"affected","version":"3.27"},{"status":"affected","version":"3.28"},{"status":"affected","version":"3.29"}]},{"modules":["FreeMarker Template Handler"],"product":"SmartAdmin","vendor":"lab1024","versions":[{"status":"affected","version":"3.0"},{"status":"affected","version":"3.1"},{"status":"affected","version":"3.2"},{"status":"affected","version":"3.3"},{"status":"affected","version":"3.4"},{"status":"affected","version":"3.5"},{"status":"affected","version":"3.6"},{"status":"affected","version":"3.7"},{"status":"affected","version":"3.8"},{"status":"affected","version":"3.9"},{"status":"affected","version":"3.10"},{"status":"affected","version":"3.11"},{"status":"affected","version":"3.12"},{"status":"affected","version":"3.13"},{"status":"affected","version":"3.14"},{"status":"affected","version":"3.15"},{"status":"affected","version":"3.16"},{"status":"affected","version":"3.17"},{"status":"affected","version":"3.18"},{"status":"affected","version":"3.19"},{"status":"affected","version":"3.20"},{"status":"affected","version":"3.21"},{"status":"affected","version":"3.22"},{"status":"affected","version":"3.23"},{"status":"affected","version":"3.24"},{"status":"affected","version":"3.25"},{"status":"affected","version":"3.26"},{"status":"affected","version":"3.27"},{"status":"affected","version":"3.28"},{"status":"affected","version":"3.29"}]}],"credits":[{"lang":"en","type":"reporter","value":"din4 (VulDB User)"},{"lang":"en","type":"coordinator","value":"VulDB"}],"descriptions":[{"lang":"en","value":"A flaw has been found in 1024-lab/lab1024 SmartAdmin up to 3.29. Affected by this issue is the function freemarkerResolverContent of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/mail/MailService.java of the component FreeMarker Template Handler. Executing a manipulation of the argument template_content can lead to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1336","description":"Improper Neutralization of Special Elements Used in a Template Engine","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-791","description":"Incomplete Filtering of Special Elements","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-08T09:02:08.086Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-349703 | 1024-lab/lab1024 SmartAdmin FreeMarker Template MailService.java freemarkerResolverContent special elements used in a template engine","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.349703"},{"name":"VDB-349703 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.349703"},{"name":"Submit #766459 | 1024-lab SmartAdmin ≤3.29 Server-Side Template Injection","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.766459"},{"tags":["exploit"],"url":"https://www.notion.so/SmartAdmin-Server-Side-Template-Injection-SSTI-in-Email-Template-Rendering-310ea92a3c418087ac63ec8e5a061b62"}],"timeline":[{"lang":"en","time":"2026-03-07T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-03-07T01:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-03-07T18:47:28.000Z","value":"VulDB entry last update"}],"title":"1024-lab/lab1024 SmartAdmin FreeMarker Template MailService.java freemarkerResolverContent special elements used in a template engine"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-3725","datePublished":"2026-03-08T09:02:08.086Z","dateReserved":"2026-03-07T17:42:23.038Z","dateUpdated":"2026-03-11T15:32:45.478Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-08 09:16:18","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-791","CWE-1336","CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine","CWE-791 Incomplete Filtering of Special Elements"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lab1024:smartadmin:*:*:*:*:*:*:*:*","versionEndIncluding":"3.29","matchCriteriaId":"155AADC4-CFDA-4FF3-A384-DB9020EF695E"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"3725","Ordinal":"1","Title":"1024-lab/lab1024 SmartAdmin FreeMarker Template MailService.java","CVE":"CVE-2026-3725","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"3725","Ordinal":"1","NoteData":"A flaw has been found in 1024-lab/lab1024 SmartAdmin up to 3.29. Affected by this issue is the function freemarkerResolverContent of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/mail/MailService.java of the component FreeMarker Template Handler. Executing a manipulation of the argument template_content can lead to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","Type":"Description","Title":"1024-lab/lab1024 SmartAdmin FreeMarker Template MailService.java"}]}}}