Vulnerability Description
A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://github.com/krayin/laravel-crm/
- https://github.com/krayin/laravel-crm/commit/73ed28d466bf14787fdb86a120c656a4af2
- https://github.com/krayin/laravel-crm/issues/2419
- https://github.com/krayin/laravel-crm/pull/2466
- https://vuldb.com/submit/781666
- https://vuldb.com/vuln/354756
- https://vuldb.com/vuln/354756/cti
FAQ
What is CVE-2026-5370?
CVE-2026-5370 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities...
How severe is CVE-2026-5370?
CVE-2026-5370 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5370?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.