Critical File Upload Flaw Found in Webkul Krayin CRM
The National Vulnerability Database (NVD) has highlighted a critical arbitrary file upload vulnerability affecting Webkul Krayin CRM versions up to v2.2.x. This flaw resides within the /admin/tinymce/upload endpoint, a component often used for content management within the CRM.
According to NVD, authenticated attackers can exploit this weakness by uploading a specially crafted PHP file. Successful exploitation allows for arbitrary code execution on the server, giving attackers a significant foothold within the compromised system. The severity is underscored by a CVSS score of 9.9, classifying it as CRITICAL. The CVSS vector indicates a network attack vector with low complexity, requiring only low privileges, and leading to high impact across confidentiality, integrity, and availability.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-38526
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-38526 | RCE | Webkul Krayin CRM v2.2.x |
| CVE-2026-38526 | Arbitrary File Upload | /admin/tinymce/upload endpoint |
| CVE-2026-38526 | Code Injection | uploading a crafted PHP file |