CVE-2026-5370
Received Received - Intake
Cross-Site Scripting in Krayin Laravel-CRM Activities Module

Publication date: 2026-04-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
krayin laravel-crm to 2.2 (inc)
krayin laravel-crm 2.1.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5370 is a stored Cross-Site Scripting (XSS) vulnerability found in the Krayin CRM application, specifically affecting the Notes field in the Contacts β†’ Persons module. This vulnerability allows authenticated users to insert malicious HTML, CSS, and JavaScript code into the Notes section of a Person record. Because the application does not properly sanitize or encode this input, the malicious code is stored and later executed in the browsers of other users who view the affected notes.

The root cause is insufficient input sanitization and unsafe dynamic HTML rendering using Vue.js directives like v-html and v-safe-html, which allowed arbitrary script execution. The vulnerability enables attackers to execute scripts in the context of other users, potentially leading to session hijacking or privilege escalation.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts in your browser when you view compromised notes in the CRM. Such scripts can steal session cookies, perform actions on your behalf, escalate privileges, or manipulate the CRM interface.

  • Potential session hijacking leading to unauthorized access.
  • Privilege escalation by executing scripts with your user permissions.
  • Injection of malicious content that could affect other users viewing the notes.
  • Disruption of normal CRM operations or data integrity through script execution.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to reproduce the stored Cross-Site Scripting (XSS) attack within the Krayin CRM application, specifically in the Contacts β†’ Persons module's Notes field.

  • Log in as any authenticated user.
  • Navigate to Contacts β†’ Persons.
  • Create or open a Person record.
  • Add a Note containing crafted HTML/JavaScript payload such as `<script>alert('XSS')</script>`.
  • Save the note and refresh or view the record as another user.

If the script executes (e.g., an alert popup appears), the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

The recommended immediate mitigation is to deploy the official patch that fixes the vulnerability by removing unsafe HTML rendering and ensuring proper escaping of user input.

  • Apply the patch identified by commit 73ed28d466bf14787fdb86a120c656a4af270153.
  • Ensure that all user input in the Notes and activity comments fields is sanitized and rendered as plain text rather than HTML.
  • Avoid using Vue.js directives like `v-html` or `v-safe-html` for rendering user-generated content.

Additionally, monitor for any suspicious activity related to stored XSS attempts and restrict authenticated user permissions if possible until the patch is applied.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-5370 is a stored Cross-Site Scripting (XSS) issue that allows malicious scripts to execute in the context of other users viewing the affected CRM application. This can lead to session hijacking, privilege escalation, or other attacks.

Such security weaknesses can impact compliance with common standards and regulations like GDPR and HIPAA because they may lead to unauthorized access or disclosure of personal or sensitive data. XSS vulnerabilities can be exploited to steal user credentials or session tokens, potentially resulting in data breaches.

Therefore, failure to address this vulnerability could result in non-compliance with data protection requirements that mandate appropriate security measures to protect personal data and prevent unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart