Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 09 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webkul:krayin_crm:1.3.0:*:*:*:*:*:*:* |
Fri, 27 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webkul
Webkul krayin Crm |
|
| Weaknesses | CWE-1336 | |
| CPEs | cpe:2.3:a:webkul:krayin_crm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Webkul
Webkul krayin Crm |
|
| Metrics |
cvssV3_1
|
Fri, 27 Sep 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-27T19:15:08.549Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-46366
Updated: 2024-09-27T19:15:02.699Z
Status : Analyzed
Published: 2024-09-27T17:15:13.400
Modified: 2025-07-09T17:57:50.767
Link: CVE-2024-46366
No data.
OpenCVE Enrichment
No data.