High severity8.8NVD Advisory· Published Apr 14, 2026· Updated Apr 23, 2026
CVE-2026-38529
CVE-2026-38529
Description
A Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily reset user passwords and perform a full account takeover via supplying a crafted HTTP request.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
krayin/laravel-crmPackagist | <= 2.2.0 | — |
Affected products
1- cpe:2.3:a:webkul:krayin_crm:2.2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/TREXNEGRO/Security-Advisories/tree/main/CVE-2026-38529nvdExploitMitigationThird Party AdvisoryWEB
- github.com/advisories/GHSA-r8rp-5f55-5j9xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-38529ghsaADVISORY
News mentions
0No linked articles in our index yet.