| CVE ID | CVE-2025-15540 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Control of Generation of Code ('Code Injection') (CWE-94) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69236 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69237 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69238 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Cross-Site Request Forgery (CSRF) (CWE-352) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69239 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Server-Side Request Forgery (SSRF) (CWE-918) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69240 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Use of Less Trusted Source (CWE-348) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69241 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69242 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69243 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.5.0 |
| Vulnerability type (CWE) | Observable Response Discrepancy (CWE-204) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69245 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-69246 |
| Publication date | 16 March 2026 |
| Vendor | Raytha |
| Product | Raytha |
| Vulnerable versions | All before 1.4.6 |
| Vulnerability type (CWE) | Improper Restriction of Excessive Authentication Attempts (CWE-307) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in Raytha software and participated in coordination of their disclosure.
The vulnerability CVE-2025-15540: "Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment.
The vulnerability CVE-2025-69236: Raytha CMS is vulnerable to Stored XSS via FieldValues[1].Value parameter in post editing functionality. Authenticated attacker with permissions to edit posts can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page.
The vulnerability CVE-2025-69237: Raytha CMS is vulnerable to Stored XSS via FieldValues[0].Value parameter in page creation functionality. Authenticated attacker with permissions to create content can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page.
The vulnerability CVE-2025-69238: Raytha CMS is vulnerable to Cross-Site Request Forgery across multiple endpoints. Attacker can craft special website, which when visited by the authenticated victim, will automatically send POST request to the endpoint (e. x. deletion of the data) without enforcing token verification.
The vulnerability CVE-2025-69239: Raytha CMS is vulnerable to Server-Side Request Forgery in the “Themes - Import from URL” feature. It allows an attacker with high privileges to provide the URL for redirecting server-side HTTP request.
The vulnerability CVE-2025-69240: Raytha CMS allows an attacker to spoof X-Forwarded-Host or Host headers to attacker controlled domain. The attacker (who knows the victim's email address) can force the server to send an email with password reset link pointing to the domain from spoofed header. When victim clicks the link, browser sends request to the attacker’s domain with the token in the path allowing the attacker to capture the token. This allows the attacker to reset victim's password and take over the victim's account.
The vulnerability CVE-2025-69241: Raytha CMS is vulnerable to Stored XSS via FirstName and LastName parameters in profile editing functionality. Authenticated attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page.
The vulnerability CVE-2025-69242: Raytha CMS is vulnerable to reflected XSS via the backToListUrl parameter. An attacker can craft a malicious URL which, when opened by authenticated victim, results in arbitrary JavaScript execution in the victim’s browser.
The vulnerability CVE-2025-69243: Raytha CMS is vulnerable to User Enumeration in password reset functionality. Difference in messages could allow an attacker to determine if the login is valid or not, enabling a brute force attack with valid logins.
The vulnerability CVE-2025-69245: Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attacker can craft a malicious URL which, when opened by the authenticated victim, results in arbitrary JavaScript execution in the victim’s browser.
The vulnerability CVE-2025-69246: Raytha CMS does not have any brute force protection mechanism implemented. It allows an attacker to send multiple automated logon requests without triggering lockout, throttling, or step-up challenges.
Issue described in CVE-2025-69243 was fixed in version 1.5.0. Remaining issues were fixed in version 1.4.6.
Credits
We thank Daniel Basta for reporting vulnerabilities CVE-2025-15540, CVE-2025-69246 and from CVE-2025-69236 to CVE-2025-69243 which he discovered and for supporting Patryk Kieszek find vulnerability CVE-2025-69245.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.