We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability has been found in Webkul Krayin CRM up to 2.1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/settings/users/edit/ of the component SVG File Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor prepares a fix for the next major release and explains that he does not think therefore that this should qualify for a CVE.
In Webkul Krayin CRM bis 2.1.0 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /admin/settings/users/edit/ der Komponente SVG File Handler. Durch Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
2025-04-13: | VulDB entry created |
2025-04-14: | Advisory disclosed |
2025-04-14: | VulDB entry last update |
shellkraft (VulDB User)
vuldb.com/?id.304609 (VDB-304609 | Webkul Krayin CRM SVG File edit cross site scripting)
vuldb.com/?ctiid.304609 (VDB-304609 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.549591 (Submit #549591 | Webkul Krayin CRM 2.1.0 Cross Site Scripting)
gist.github.com/shellkraft/a8b1f35d5c3ba313605065889563fb00
drive.google.com/...WquJRWzJAV2bpWMTuiMs6Xa/view?usp=sharing
Support options