Vulnerability Description
A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webkul | Krayin Crm | 1.3.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/Tommywarren/89cef7f876ee897a4ff40a8b71b6208eThird Party Advisory
FAQ
What is CVE-2024-46366?
CVE-2024-46366 is a vulnerability with a CVSS score of 8.8 (HIGH). A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead...
How severe is CVE-2024-46366?
CVE-2024-46366 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-46366?
Check the references section above for vendor advisories and patch information. Affected products include: Webkul Krayin Crm.