CVE-2025-3568

A vulnerability has been found in Webkul Krayin CRM up to 2.1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/settings/users/edit/ of the component SVG File Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor prepares a fix for the next major release and explains that he does not think therefore that this should qualify for a CVE.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:webkul:krayin_crm:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:webkul:krayin_crm:2.1.0:*:*:*:*:*:*:*

History

26 Jun 2025, 19:21

Type Values Removed Values Added
CPE cpe:2.3:a:webkul:krayin_crm:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:webkul:krayin_crm:2.1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 3.5
v2 : unknown
v3 : 5.4
First Time Webkul krayin Crm
Webkul
References () https://gist.github.com/shellkraft/a8b1f35d5c3ba313605065889563fb00 - () https://gist.github.com/shellkraft/a8b1f35d5c3ba313605065889563fb00 - Exploit, Third Party Advisory
References () https://vuldb.com/?id.304609 - () https://vuldb.com/?id.304609 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.549591 - () https://vuldb.com/?submit.549591 - Third Party Advisory, VDB Entry
References () https://drive.google.com/file/d/1LMzZyCgloWquJRWzJAV2bpWMTuiMs6Xa/view?usp=sharing - () https://drive.google.com/file/d/1LMzZyCgloWquJRWzJAV2bpWMTuiMs6Xa/view?usp=sharing - Exploit
References () https://vuldb.com/?ctiid.304609 - () https://vuldb.com/?ctiid.304609 - Permissions Required, VDB Entry

14 Apr 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-14 14:15

Updated : 2025-06-26 19:21


NVD link : CVE-2025-3568

Mitre link : CVE-2025-3568


JSON object : View

Products Affected

webkul

  • krayin_crm
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')