First published: Sat May 27 2023(Updated: )
A vulnerability, which was classified as problematic, was found in Webkul krayin crm 1.2.4. This affects an unknown part of the file /admin/contacts/organizations/edit/2 of the component Edit Person Page. The manipulation of the argument Organization leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230079. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webkul krayin crm | =1.2.4 | |
=1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2925 is a vulnerability that allows for cross-site scripting (XSS) attacks in Webkul krayin crm 1.2.4.
CVE-2023-2925 has a severity rating of medium (5.4).
CVE-2023-2925 affects the component Edit Person Page in Webkul krayin crm 1.2.4, allowing for cross-site scripting (XSS) attacks.
CVE-2023-2925 is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation)
To fix CVE-2023-2925, it is recommended to update to a patched version of Webkul krayin crm.