Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch. | |
| Title | krayin laravel-crm Activities Module/Notes inbox.spec.ts composeMail cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-02T17:30:14.701Z
Reserved: 2026-04-01T18:56:23.688Z
Link: CVE-2026-5370
No data.
Status : Received
Published: 2026-04-02T18:16:35.343
Modified: 2026-04-02T18:16:35.343
Link: CVE-2026-5370
No data.
OpenCVE Enrichment
No data.