{"api_version":"1","generated_at":"2026-04-30T12:37:32+00:00","cve":"CVE-2026-7468","urls":{"html":"https://cve.report/CVE-2026-7468","api":"https://cve.report/api/cve/CVE-2026-7468.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-7468","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-7468"},"summary":{"title":"1024-lab smart-admin Demo Site index.html access control","description":"A security vulnerability has been detected in 1024-lab smart-admin up to 3.30.0. This affects an unknown function of the file /smart-admin-api/druid/index.html of the component Demo Site. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-04-30 01:16:03","updated_at":"2026-04-30 01:16:03"},"problem_types":["CWE-266","CWE-284","CWE-284 Improper Access Controls","CWE-266 Incorrect Privilege Assignment"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"5.5","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"6.9","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":6.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Primary","score":"7.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"7.3","severity":"HIGH","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://vuldb.com/submit/804228","name":"https://vuldb.com/submit/804228","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/360204","name":"https://vuldb.com/vuln/360204","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/1024-lab/smart-admin/issues/117","name":"https://github.com/1024-lab/smart-admin/issues/117","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/1024-lab/smart-admin/","name":"https://github.com/1024-lab/smart-admin/","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/360204/cti","name":"https://vuldb.com/vuln/360204/cti","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-7468","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7468","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.0","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.1","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.2","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.3","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.4","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.5","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.6","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.7","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.8","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.9","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.10","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.11","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.12","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.13","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.14","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.15","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.16","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.17","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.18","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.19","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.20","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.21","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.22","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.23","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.24","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.25","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.26","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.27","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.28","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.29","platforms":[]},{"source":"CNA","vendor":"1024-lab","product":"smart-admin","version":"affected 3.30.0","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-04-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-04-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-04-29T21:22:19.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"renyu (VulDB User)","lang":"en"},{"source":"CNA","value":"VulDB CNA Team","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"modules":["Demo Site"],"product":"smart-admin","vendor":"1024-lab","versions":[{"status":"affected","version":"3.0"},{"status":"affected","version":"3.1"},{"status":"affected","version":"3.2"},{"status":"affected","version":"3.3"},{"status":"affected","version":"3.4"},{"status":"affected","version":"3.5"},{"status":"affected","version":"3.6"},{"status":"affected","version":"3.7"},{"status":"affected","version":"3.8"},{"status":"affected","version":"3.9"},{"status":"affected","version":"3.10"},{"status":"affected","version":"3.11"},{"status":"affected","version":"3.12"},{"status":"affected","version":"3.13"},{"status":"affected","version":"3.14"},{"status":"affected","version":"3.15"},{"status":"affected","version":"3.16"},{"status":"affected","version":"3.17"},{"status":"affected","version":"3.18"},{"status":"affected","version":"3.19"},{"status":"affected","version":"3.20"},{"status":"affected","version":"3.21"},{"status":"affected","version":"3.22"},{"status":"affected","version":"3.23"},{"status":"affected","version":"3.24"},{"status":"affected","version":"3.25"},{"status":"affected","version":"3.26"},{"status":"affected","version":"3.27"},{"status":"affected","version":"3.28"},{"status":"affected","version":"3.29"},{"status":"affected","version":"3.30.0"}]}],"credits":[{"lang":"en","type":"reporter","value":"renyu (VulDB User)"},{"lang":"en","type":"coordinator","value":"VulDB CNA Team"}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in 1024-lab smart-admin up to 3.30.0. This affects an unknown function of the file /smart-admin-api/druid/index.html of the component Demo Site. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"baseScore":6.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-284","description":"Improper Access Controls","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-266","description":"Incorrect Privilege Assignment","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-30T01:00:13.571Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-360204 | 1024-lab smart-admin Demo Site index.html access control","tags":["vdb-entry"],"url":"https://vuldb.com/vuln/360204"},{"name":"VDB-360204 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/vuln/360204/cti"},{"name":"Submit #804228 | 1024-lab smart-admin 3.30.0 Exposure of Sensitive System Information to an Unauthorized Cont","tags":["third-party-advisory"],"url":"https://vuldb.com/submit/804228"},{"tags":["exploit","issue-tracking"],"url":"https://github.com/1024-lab/smart-admin/issues/117"},{"tags":["product"],"url":"https://github.com/1024-lab/smart-admin/"}],"timeline":[{"lang":"en","time":"2026-04-29T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-04-29T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-04-29T21:22:19.000Z","value":"VulDB entry last update"}],"title":"1024-lab smart-admin Demo Site index.html access control"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-7468","datePublished":"2026-04-30T01:00:13.571Z","dateReserved":"2026-04-29T19:17:13.210Z","dateUpdated":"2026-04-30T01:00:13.571Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-30 01:16:03","lastModifiedDate":"2026-04-30 01:16:03","problem_types":["CWE-266","CWE-284","CWE-284 Improper Access Controls","CWE-266 Incorrect Privilege Assignment"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"7468","Ordinal":"1","Title":"1024-lab smart-admin Demo Site index.html access control","CVE":"CVE-2026-7468","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"7468","Ordinal":"1","NoteData":"A security vulnerability has been detected in 1024-lab smart-admin up to 3.30.0. This affects an unknown function of the file /smart-admin-api/druid/index.html of the component Demo Site. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.","Type":"Description","Title":"1024-lab smart-admin Demo Site index.html access control"}]}}}