A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
References
Link | Resource |
---|---|
https://gist.github.com/Tommywarren/89cef7f876ee897a4ff40a8b71b6208e | Third Party Advisory |
Configurations
History
09 Jul 2025, 17:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webkul:krayin_crm:1.3.0:*:*:*:*:*:*:* | |
References | () https://gist.github.com/Tommywarren/89cef7f876ee897a4ff40a8b71b6208e - Third Party Advisory | |
First Time |
Webkul
Webkul krayin Crm |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Sep 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-1336 |
27 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-27 17:15
Updated : 2025-07-09 17:57
NVD link : CVE-2024-46366
Mitre link : CVE-2024-46366
CVE.ORG link : CVE-2024-46366
JSON object : View
Products Affected
webkul
- krayin_crm
CWE