Krayin CRM SSRF Exposes Internal Resources
The National Vulnerability Database (NVD) has flagged CVE-2026-38527, detailing a high-severity Server-Side Request Forgery (SSRF) vulnerability within Webkul Krayin CRM versions 2.2.x. This flaw, residing in the /settings/webhooks/create component, allows an authenticated attacker to craft a POST request and use the CRM as a proxy to scan internal network resources. Think of it as giving an attacker a map and a key to your internal network, even if they can’t directly walk through the front door.
An SSRF vulnerability like this is a real headache because it can bypass perimeter defenses. While the NVD assigns a CVSS score of 8.5 (HIGH), indicating significant risk, the specific impact hinges on what internal systems are reachable and what data they hold. An attacker could potentially map out your network topology, identify other vulnerable services, or even exfiltrate sensitive data if the CRM’s internal access allows it. It’s a classic case of a seemingly innocuous feature turning into a dangerous pivot point.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 5 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
C2 Beacon Detection — HTTP to Suspicious Domain
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-38527 | SSRF | Webkul Krayin CRM v2.2.x |
| CVE-2026-38527 | SSRF | /settings/webhooks/create component |
| CVE-2026-38527 | SSRF | Crafted POST request |