CVE-2026-5370: Krayin CRM is vulnerable to Cross-site Scripting (XSS)
(updated )
A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.
References
- github.com/advisories/GHSA-9m2v-hc5g-5jpv
- github.com/krayin/laravel-crm
- github.com/krayin/laravel-crm/commit/73ed28d466bf14787fdb86a120c656a4af270153
- github.com/krayin/laravel-crm/issues/2419
- github.com/krayin/laravel-crm/pull/2466
- nvd.nist.gov/vuln/detail/CVE-2026-5370
- vuldb.com/submit/781666
- vuldb.com/vuln/354756
- vuldb.com/vuln/354756/cti
Code Behaviors & Features
Detect and mitigate CVE-2026-5370 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →