First published: Fri Sep 27 2024(Updated: )
A Stored Cross-Site Scripting (XSS) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to inject arbitrary JavaScript code by submitting a malicious payload within the username field. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webkul Krayin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46367 has a high severity rating as it allows remote attackers to execute arbitrary JavaScript via stored XSS.
To fix CVE-2024-46367, it is recommended to validate and sanitize user input in the username field and update to a patched version of Webkul Krayin CRM.
The potential impacts of CVE-2024-46367 include privilege escalation and unauthorized access to sensitive information.
CVE-2024-46367 affects users of Webkul Krayin CRM version 1.3.0.
Yes, CVE-2024-46367 can be easily exploited by submitting a malicious payload in the username field.