High severity8.1NVD Advisory· Published Apr 14, 2026· Updated Apr 23, 2026
CVE-2026-38530
CVE-2026-38530
Description
A Broken Object-Level Authorization (BOLA) in the /Controllers/Lead/LeadController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any lead owned by other users via supplying a crafted GET request.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
krayin/laravel-crmPackagist | <= 2.2.0 | — |
Affected products
1- cpe:2.3:a:webkul:krayin_crm:2.2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/TREXNEGRO/Security-Advisories/tree/main/CVE-2026-38530nvdExploitMitigationThird Party AdvisoryWEB
- github.com/advisories/GHSA-rm5f-3c25-p4cwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-38530ghsaADVISORY
News mentions
0No linked articles in our index yet.