<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Krayin-Crm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/krayin-crm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/krayin-crm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)</title><link>https://feed.craftedsignal.io/briefs/2026-04-krayin-crm-ssrf/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-krayin-crm-ssrf/</guid><description>A Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.</description><content:encoded><![CDATA[<p>CVE-2026-38527 details a Server-Side Request Forgery (SSRF) vulnerability affecting Webkul Krayin CRM version 2.2.x. The vulnerability is located in the <code>/settings/webhooks/create</code> component. An attacker can exploit this flaw by crafting a malicious POST request that forces the server to make requests to internal resources. This can be leveraged to scan internal network infrastructure, potentially revealing sensitive information or accessing internal services that are not meant to be exposed to the outside world. The vulnerability was published on April 14, 2026. Exploitation requires the attacker to be able to send POST requests to the affected endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Webkul Krayin CRM instance running version 2.2.x.</li>
<li>The attacker crafts a POST request targeting the <code>/settings/webhooks/create</code> endpoint.</li>
<li>The POST request includes a malicious payload in the body, designed to trigger an SSRF vulnerability. This payload could involve specifying a URL for the webhook to call back to.</li>
<li>The vulnerable server processes the crafted POST request and attempts to create a new webhook.</li>
<li>The server-side component incorrectly handles or sanitizes the URL provided for the webhook callback.</li>
<li>As part of the webhook creation process, the server initiates an HTTP request to the attacker-controlled URL or internal resource specified in the crafted POST request.</li>
<li>The server successfully connects to the specified resource, potentially revealing information about the internal network or services.</li>
<li>The attacker analyzes the response from the internal service or server to gather sensitive information, such as internal hostnames, open ports, or service versions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-38527) can allow an attacker to enumerate internal network resources, potentially identifying sensitive services and systems. This information can be used to further compromise the target environment, potentially leading to data breaches or system compromise. While the specific number of affected organizations is unknown, any organization using a vulnerable version of Webkul Krayin CRM is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patch or upgrade to a version of Webkul Krayin CRM that resolves CVE-2026-38527.</li>
<li>Implement strict input validation and sanitization on all user-supplied data, especially URLs, to prevent SSRF attacks.</li>
<li>Monitor web server logs for suspicious requests to the <code>/settings/webhooks/create</code> endpoint, looking for unusual URLs or request patterns, using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks by restricting access to sensitive internal resources.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-38527</category><category>ssrf</category><category>webkul</category><category>krayin-crm</category></item><item><title>Krayin CRM v2.2.x SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-krayin-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-krayin-sqli/</guid><description>Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.</description><content:encoded><![CDATA[<p>Krayin CRM v2.2.x is susceptible to a SQL injection vulnerability identified as CVE-2026-38528. The vulnerability resides in the <code>/Lead/LeadDataGrid.php</code> script, specifically within the <code>rotten_lead</code> parameter. An attacker could exploit this vulnerability by injecting malicious SQL queries, potentially gaining unauthorized access to sensitive information stored within the CRM database. The CVSS v3.1 score is 7.1, indicating a high severity level. Successful exploitation requires a low level of privileges. This vulnerability was reported in April 2026 and could impact organizations using the affected Krayin CRM version, leading to data breaches and potential compromise of customer information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Krayin CRM v2.2.x instance.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/Lead/LeadDataGrid.php</code>.</li>
<li>The HTTP request includes a SQL injection payload within the <code>rotten_lead</code> parameter.</li>
<li>The Krayin CRM application processes the request without proper sanitization of the <code>rotten_lead</code> parameter.</li>
<li>The injected SQL query is executed against the CRM database.</li>
<li>The attacker retrieves sensitive data from the database, such as customer details, user credentials, or financial information.</li>
<li>The attacker may use the compromised data for further malicious activities, such as identity theft or financial fraud.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to the unauthorized disclosure of sensitive customer data, financial records, and internal CRM data. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. While the exact number of potential victims is unknown, any organization using Krayin CRM v2.2.x is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from the vendor to address CVE-2026-38528.</li>
<li>Implement input validation and sanitization on the <code>rotten_lead</code> parameter within <code>/Lead/LeadDataGrid.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Krayin CRM SQL Injection Attempt&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor web server logs for suspicious requests targeting <code>/Lead/LeadDataGrid.php</code> with potentially malicious SQL syntax.</li>
<li>Implement strong database access controls to limit the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-38528</category><category>krayin-crm</category></item><item><title>Webkul Krayin CRM BOLA Vulnerability (CVE-2026-38529)</title><link>https://feed.craftedsignal.io/briefs/2026-04-krayin-bola/</link><pubDate>Tue, 14 Apr 2026 16:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-krayin-bola/</guid><description>CVE-2026-38529 is a Broken Object-Level Authorization (BOLA) vulnerability in Webkul Krayin CRM v2.2.x that allows authenticated attackers to reset user passwords and take over accounts.</description><content:encoded><![CDATA[<p>CVE-2026-38529 describes a Broken Object-Level Authorization (BOLA) vulnerability affecting Webkul Krayin CRM version 2.2.x. The vulnerability resides in the <code>/Settings/UserController.php</code> endpoint. An authenticated attacker can exploit this flaw by sending a crafted HTTP request. Successful exploitation allows the attacker to arbitrarily reset the passwords of other users, leading to complete account takeover. Given the potential for widespread compromise and data breaches, this vulnerability poses a critical risk to organizations using the affected Krayin CRM version. Publicly available information regarding exploitation is available on GitHub.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Krayin CRM application with valid credentials.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Settings/UserController.php</code> endpoint.</li>
<li>The crafted request is designed to reset the password of a target user, specifying the target user&rsquo;s ID.</li>
<li>Due to the BOLA vulnerability, the application fails to properly validate if the authenticated user has the authorization to modify the target user&rsquo;s password.</li>
<li>The application resets the target user&rsquo;s password using the attacker-supplied data.</li>
<li>The attacker uses the new password to log in to the target user&rsquo;s account.</li>
<li>The attacker gains full control over the target user&rsquo;s account and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-38529 allows attackers to compromise user accounts within a Webkul Krayin CRM v2.2.x instance. This can lead to unauthorized access to sensitive customer data, business records, and other confidential information. A successful attack could result in data breaches, financial loss, reputational damage, and legal liabilities. Given the potential for complete account takeover, the impact is considered critical for organizations using the vulnerable CRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a secure version of Krayin CRM that addresses CVE-2026-38529 as soon as it becomes available.</li>
<li>Implement the Sigma rule <code>Detect Krayin CRM Password Reset via UserController</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Review and enforce strict access control policies within the Krayin CRM application to prevent unauthorized modification of user accounts.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/Settings/UserController.php</code> endpoint.</li>
<li>Enable web server logging to capture detailed information about HTTP requests, including request parameters.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>bola</category><category>cve-2026-38529</category><category>krayin-crm</category><category>account-takeover</category></item></channel></rss>