If you discover a security vulnerability in AdminLTE, please report it by emailing the maintainers or opening a private security advisory on GitHub. We take security seriously and will respond promptly.
| Version | Supported |
|---|---|
| 4.x | ✅ |
| 3.x | ❌ |
| < 3.0 | ❌ |
AdminLTE is a frontend admin dashboard template. When deploying applications built with AdminLTE, follow these security best practices:
- Never expose
node_modulesdirectory in production environments - Remove demo/example files (like
index2.html,index3.html) from production builds - Use a proper build process that only includes necessary production assets
- Configure web server properly to prevent directory traversal attacks
When deploying to production:
# Build only production assets
npm run production
# Deploy only the dist/ directory contents you need
# Typically: dist/js/adminlte.min.js and dist/css/adminlte.min.cssDo not deploy these to production:
node_modules/directory- Example/demo HTML files (
index.html,index2.html,index3.html, etc.) - Source files (
src/directory) - Development configuration files
- Documentation files
Status: This CVE is disputed and does not represent a vulnerability in AdminLTE itself.
Issue: CVE-2021-36471 claims AdminLTE 3.1.0 has a "Directory Traversal vulnerability" that allows remote attackers to view demo pages via /admin/index2.html and /admin/index3.html.
Clarification:
- The
index2.htmlandindex3.htmlfiles are example/demo pages intended for developer reference during development - This is not a vulnerability in AdminLTE - it is a deployment misconfiguration by website developers
- The issue occurs when developers incorrectly deploy:
- Their entire
node_modulesfolder publicly - Demo/example files in production environments
- Without proper web server configuration
- Their entire
Resolution:
- AdminLTE 4.x has restructured the project architecture with clear separation between development demos and production assets
- Follow the production deployment best practices above
- Only deploy the compiled production assets from
dist/js/anddist/css/ - The original CVE researcher acknowledged this should be classified as low/info severity, not critical
For More Information:
- GitHub Issue #4948
- CVE Record (marked as disputed)
When implementing AdminLTE in your application, consider adding appropriate Content Security Policy headers to prevent XSS attacks.
AdminLTE is a UI template only and does not include authentication or authorization. You must:
- Implement proper authentication in your backend
- Secure all API endpoints
- Use HTTPS in production
- Implement proper session management
- Follow OWASP security guidelines
- Keep AdminLTE and its dependencies up to date
- Regularly run
npm auditto check for vulnerabilities - Review security advisories for Bootstrap and other dependencies
For security concerns, please contact the maintainers through:
- GitHub Issues (for general questions)
- GitHub Security Advisories (for sensitive security issues)
- Project maintainer email (check package.json)