CVE-2026-5370
krayin laravel-crm Activities Module/Notes inbox.spec.ts composeMail cross site scripting
CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
10th
A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.
| CWE | CWE-79 CWE-94 |
| Vendor | krayin |
| Product | laravel-crm |
| Published | Apr 2, 2026 |
| Last Updated | Apr 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for krayin laravel-crm
Be the first to know when new low vulnerabilities affecting krayin laravel-crm are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
krayin / laravel-crm
2.0 2.1 2.2
References
vuldb.com: https://vuldb.com/vuln/354756 vuldb.com: https://vuldb.com/vuln/354756/cti vuldb.com: https://vuldb.com/submit/781666 github.com: https://github.com/krayin/laravel-crm/issues/2419 github.com: https://github.com/krayin/laravel-crm/pull/2466 github.com: https://github.com/krayin/laravel-crm/commit/73ed28d466bf14787fdb86a120c656a4af270153 github.com: https://github.com/krayin/laravel-crm/
Credits
๐ DineshrajanSv (VulDB User) DineshrajanSv (VulDB User)