PHP EUVD-2026-22300

| CVE-2026-38529 HIGH
Improper Privilege Management (CWE-269)
2026-04-14 mitre GHSA-r8rp-5f55-5j9x
8.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Re-analysis Queued
Apr 17, 2026 - 15:52 vuln.today
cvss_changed
Analysis Generated
Apr 14, 2026 - 17:01 vuln.today

DescriptionNVD

A Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily reset user passwords and perform a full account takeover via supplying a crafted HTTP request.

AnalysisAI

Authenticated attackers can reset arbitrary user passwords in Webkul Krayin CRM v2.2.x through a Broken Object-Level Authorization (BOLA) vulnerability in the /Settings/UserController.php endpoint, enabling full account takeover of any user account. The attack requires low-privilege authentication (PR:L) and is exploitable remotely with low complexity (AV:N/AC:L), presenting an 8.8 CVSS severity with high impact to confidentiality, integrity, and availability. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all Webkul Krayin CRM v2.2.x deployments and restrict network access to /Settings/UserController.php endpoint via WAF or network controls; disable non-essential user accounts with low privileges. Within 7 days: Implement mandatory multi-factor authentication (MFA) for all CRM user accounts and conduct password reset for all users; review access logs for suspicious password reset activity. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22300 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy