提出 #781666: Krayin Laravel CRM <= 2.1 (before patch in PR #2466) Cross Site Scripting (Stored XSS) – CWE-79情報

タイトルKrayin Laravel CRM <= 2.1 (before patch in PR #2466) Cross Site Scripting (Stored XSS) – CWE-79
説明A Stored Cross-Site Scripting (XSS) vulnerability exists in the Activities / Notes module of Krayin Laravel CRM. The application previously rendered user-supplied activity comments and notes using dynamic HTML rendering (v-html / v-safe-html) in Vue.js components. Because input was not properly escaped, attackers could store malicious JavaScript payloads which would execute whenever the content was viewed. This allows an authenticated attacker to inject arbitrary JavaScript that executes in the browser of other users accessing the affected record. The issue was fixed by removing unsafe HTML rendering and switching to escaped Vue interpolation, ensuring user input is rendered as plain text.
ソース⚠️ https://github.com/krayin/laravel-crm/pull/2466
ユーザー DineshrajanSv (UID 96525)
送信2026年03月17日 08:03 (21 日 ago)
モデレーション2026年04月01日 20:56 (15 days later)
ステータス承諾済み
VulDBエントリ354756 [krayin laravel-crm 迄 2.2 Activities Module/Notes inbox.spec.ts composeMail クロスサイトスクリプティング]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!