Webkul Krayin CRM: Critical Auth Flaw Lets Attackers Steal Leads
A serious Broken Object-Level Authorization (BOLA) vulnerability has been identified in Webkul Krayin CRM, version 2.2.x. According to the National Vulnerability Database, this flaw resides within the /Controllers/Lead/LeadController.php endpoint.
Exploiting this vulnerability requires authenticated access, but once inside, attackers can leverage a crafted GET request to arbitrarily read, modify, or permanently delete lead data belonging to other users within the CRM. The National Vulnerability Database assigns this vulnerability a CVSS score of 8.1, classifying it as HIGH severity.
The details, as shared by the National Vulnerability Database, highlight the potential for significant data compromise and disruption. Given the nature of CRM systems, this could impact sales pipelines, customer relationships, and sensitive business intelligence.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 5 SIEM formats2 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Credential Abuse from Breached Vendor — CVE-2026-38530
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
2 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-38530 | Webkul Krayin CRM v2.2.x | |
| CVE-2026-38530 | /Controllers/Lead/LeadController.php endpoint | |
| CVE-2026-38530 | Arbitrary read, modify, and delete of leads via crafted GET request |