Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. krayin/laravel-crm
  4. ›
  5. CVE-2026-5370

CVE-2026-5370: Krayin CRM is vulnerable to Cross-site Scripting (XSS)

April 2, 2026 (updated April 4, 2026)

A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.

References

  • github.com/advisories/GHSA-9m2v-hc5g-5jpv
  • github.com/krayin/laravel-crm
  • github.com/krayin/laravel-crm/commit/73ed28d466bf14787fdb86a120c656a4af270153
  • github.com/krayin/laravel-crm/issues/2419
  • github.com/krayin/laravel-crm/pull/2466
  • nvd.nist.gov/vuln/detail/CVE-2026-5370
  • vuldb.com/submit/781666
  • vuldb.com/vuln/354756
  • vuldb.com/vuln/354756/cti

Code Behaviors & Features

Detect and mitigate CVE-2026-5370 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.2.0

Solution

Unfortunately, there is no solution available yet.

Impact 3.5 LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/krayin/laravel-crm/CVE-2026-5370.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 10 Apr 2026 12:19:46 +0000.