| Título | Krayin Laravel CRM <= 2.1 (before patch in PR #2466) Cross Site Scripting (Stored XSS) – CWE-79 |
|---|
| Descripción | A Stored Cross-Site Scripting (XSS) vulnerability exists in the Activities / Notes module of Krayin Laravel CRM.
The application previously rendered user-supplied activity comments and notes using dynamic HTML rendering (v-html / v-safe-html) in Vue.js components. Because input was not properly escaped, attackers could store malicious JavaScript payloads which would execute whenever the content was viewed.
This allows an authenticated attacker to inject arbitrary JavaScript that executes in the browser of other users accessing the affected record.
The issue was fixed by removing unsafe HTML rendering and switching to escaped Vue interpolation, ensuring user input is rendered as plain text. |
|---|
| Fuente | ⚠️ https://github.com/krayin/laravel-crm/pull/2466 |
|---|
| Usuario | DineshrajanSv (UID 96525) |
|---|
| Sumisión | 2026-03-17 08:03 (hace 20 días) |
|---|
| Moderación | 2026-04-01 20:56 (15 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 354756 [krayin laravel-crm hasta 2.2 Activities Module/Notes inbox.spec.ts composeMail secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|