Description
A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.
Problem types
Product status
2.1
2.2
Timeline
| 2026-04-01: | Advisory disclosed |
| 2026-04-01: | VulDB entry created |
| 2026-04-02: | VulDB entry last update |
Credits
DineshrajanSv (VulDB User)
DineshrajanSv (VulDB User)
References
vuldb.com/vuln/354756 (VDB-354756 | krayin laravel-crm Activities Module/Notes inbox.spec.ts composeMail cross site scripting)
vuldb.com/vuln/354756/cti (VDB-354756 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/781666 (Submit #781666 | Krayin Laravel CRM <= 2.1 (before patch in PR #2466) Cross Site Scripting (Stored XSS) – CWE-79)
github.com/krayin/laravel-crm/issues/2419
github.com/krayin/laravel-crm/pull/2466
github.com/...ommit/73ed28d466bf14787fdb86a120c656a4af270153
github.com/krayin/laravel-crm/