๐Ÿ” CVE Alert

CVE-2026-5370

LOW 3.5

krayin laravel-crm Activities Module/Notes inbox.spec.ts composeMail cross site scripting

CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
10th

A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.

CWE CWE-79 CWE-94
Vendor krayin
Product laravel-crm
Published Apr 2, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for krayin laravel-crm

Be the first to know when new low vulnerabilities affecting krayin laravel-crm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

krayin / laravel-crm
2.0 2.1 2.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/354756 vuldb.com: https://vuldb.com/vuln/354756/cti vuldb.com: https://vuldb.com/submit/781666 github.com: https://github.com/krayin/laravel-crm/issues/2419 github.com: https://github.com/krayin/laravel-crm/pull/2466 github.com: https://github.com/krayin/laravel-crm/commit/73ed28d466bf14787fdb86a120c656a4af270153 github.com: https://github.com/krayin/laravel-crm/

Credits

๐Ÿ” DineshrajanSv (VulDB User) DineshrajanSv (VulDB User)