You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: advisories/github-reviewed/2026/04/GHSA-9m2v-hc5g-5jpv/GHSA-9m2v-hc5g-5jpv.json
+28-7Lines changed: 28 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,12 @@
1
1
{
2
2
"schema_version": "1.4.0",
3
3
"id": "GHSA-9m2v-hc5g-5jpv",
4
-
"modified": "2026-04-02T18:31:39Z",
4
+
"modified": "2026-04-04T06:19:40Z",
5
5
"published": "2026-04-02T18:31:39Z",
6
6
"aliases": [
7
7
"CVE-2026-5370"
8
8
],
9
+
"summary": "Krayin CRM is vulnerable to Cross-site Scripting (XSS)",
9
10
"details": "A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.",
0 commit comments