<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-38528 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-38528/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-38528/feed.xml" rel="self" type="application/rss+xml"/><item><title>Krayin CRM v2.2.x SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-krayin-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-krayin-sqli/</guid><description>Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.</description><content:encoded><![CDATA[<p>Krayin CRM v2.2.x is susceptible to a SQL injection vulnerability identified as CVE-2026-38528. The vulnerability resides in the <code>/Lead/LeadDataGrid.php</code> script, specifically within the <code>rotten_lead</code> parameter. An attacker could exploit this vulnerability by injecting malicious SQL queries, potentially gaining unauthorized access to sensitive information stored within the CRM database. The CVSS v3.1 score is 7.1, indicating a high severity level. Successful exploitation requires a low level of privileges. This vulnerability was reported in April 2026 and could impact organizations using the affected Krayin CRM version, leading to data breaches and potential compromise of customer information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Krayin CRM v2.2.x instance.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/Lead/LeadDataGrid.php</code>.</li>
<li>The HTTP request includes a SQL injection payload within the <code>rotten_lead</code> parameter.</li>
<li>The Krayin CRM application processes the request without proper sanitization of the <code>rotten_lead</code> parameter.</li>
<li>The injected SQL query is executed against the CRM database.</li>
<li>The attacker retrieves sensitive data from the database, such as customer details, user credentials, or financial information.</li>
<li>The attacker may use the compromised data for further malicious activities, such as identity theft or financial fraud.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to the unauthorized disclosure of sensitive customer data, financial records, and internal CRM data. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. While the exact number of potential victims is unknown, any organization using Krayin CRM v2.2.x is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from the vendor to address CVE-2026-38528.</li>
<li>Implement input validation and sanitization on the <code>rotten_lead</code> parameter within <code>/Lead/LeadDataGrid.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Krayin CRM SQL Injection Attempt&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor web server logs for suspicious requests targeting <code>/Lead/LeadDataGrid.php</code> with potentially malicious SQL syntax.</li>
<li>Implement strong database access controls to limit the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-38528</category><category>krayin-crm</category></item></channel></rss>