Krayin CRM v2.2.x SQL Injection Vulnerability
Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.
Krayin CRM v2.2.x is susceptible to a SQL injection vulnerability identified as CVE-2026-38528. The vulnerability resides in the /Lead/LeadDataGrid.php script, specifically within the rotten_lead parameter. An attacker could exploit this vulnerability by injecting malicious SQL queries, potentially gaining unauthorized access to sensitive information stored within the CRM database. The CVSS v3.1 score is 7.1, indicating a high severity level. Successful exploitation requires a low level of privileges. This vulnerability was reported in April 2026 and could impact organizations using the affected Krayin CRM version, leading to data breaches and potential compromise of customer information.
Attack Chain
- An attacker identifies a vulnerable Krayin CRM v2.2.x instance.
- The attacker crafts a malicious HTTP request targeting
/Lead/LeadDataGrid.php. - The HTTP request includes a SQL injection payload within the
rotten_leadparameter. - The Krayin CRM application processes the request without proper sanitization of the
rotten_leadparameter. - The injected SQL query is executed against the CRM database.
- The attacker retrieves sensitive data from the database, such as customer details, user credentials, or financial information.
- The attacker may use the compromised data for further malicious activities, such as identity theft or financial fraud.
Impact
Successful exploitation of this SQL injection vulnerability could lead to the unauthorized disclosure of sensitive customer data, financial records, and internal CRM data. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. While the exact number of potential victims is unknown, any organization using Krayin CRM v2.2.x is at risk.
Recommendation
- Apply any available patches or updates from the vendor to address CVE-2026-38528.
- Implement input validation and sanitization on the
rotten_leadparameter within/Lead/LeadDataGrid.phpto prevent SQL injection attacks. - Deploy the Sigma rule “Detect Krayin CRM SQL Injection Attempt” to your SIEM and tune for your environment.
- Monitor web server logs for suspicious requests targeting
/Lead/LeadDataGrid.phpwith potentially malicious SQL syntax. - Implement strong database access controls to limit the impact of successful SQL injection attacks.
Detection coverage 2
Detect Krayin CRM SQL Injection Attempt
highDetects potential SQL injection attempts targeting the /Lead/LeadDataGrid.php endpoint in Krayin CRM.
Detect Krayin CRM Error Based SQL Injection
highDetects error-based SQL injection attempts targeting Krayin CRM.
Detection queries are kept inside the platform. Get full rules →