Ad

CVE-2026-5370

MEDIUM CVSS 4.0: 5.1 EPSS 0.03%
Updated Apr 03, 2026
Laravel
Parameter Value
CVSS 5.1 (MEDIUM)
Type CWE-94 (Code Injection), CWE-79 (Cross-Site Scripting (XSS))
Vendor Laravel
Public PoC No

A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting.

Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153.

To fix this issue, it is recommended to deploy a patch.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
Low
Basic privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products

krayin:laravel-crm