Soumettre #781666: Krayin Laravel CRM <= 2.1 (before patch in PR #2466) Cross Site Scripting (Stored XSS) – CWE-79information

TitreKrayin Laravel CRM <= 2.1 (before patch in PR #2466) Cross Site Scripting (Stored XSS) – CWE-79
DescriptionA Stored Cross-Site Scripting (XSS) vulnerability exists in the Activities / Notes module of Krayin Laravel CRM. The application previously rendered user-supplied activity comments and notes using dynamic HTML rendering (v-html / v-safe-html) in Vue.js components. Because input was not properly escaped, attackers could store malicious JavaScript payloads which would execute whenever the content was viewed. This allows an authenticated attacker to inject arbitrary JavaScript that executes in the browser of other users accessing the affected record. The issue was fixed by removing unsafe HTML rendering and switching to escaped Vue interpolation, ensuring user input is rendered as plain text.
La source⚠️ https://github.com/krayin/laravel-crm/pull/2466
Utilisateur DineshrajanSv (UID 96525)
Soumission17/03/2026 08:03 (il y a 17 jours)
Modérer01/04/2026 20:56 (15 days later)
StatutAccepté
Entrée VulDB354756 [krayin laravel-crm jusqu’à 2.2 Activities Module/Notes inbox.spec.ts composeMail cross site scripting]
Points20

Do you know our Splunk app?

Download it now for free!