Home

Description

Raytha CMS is vulnerable to Stored XSS via FirstName and LastName parameters in profile editing functionality. Authenticated attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issue was fixed in version 1.4.6.

PUBLISHED Reserved 2025-12-30 | Published 2026-03-16 | Updated 2026-03-16 | Assigner CERT-PL




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

Any version before 1.4.6
affected

Credits

Daniel Basta finder

References

cert.pl/en/posts/2026/03/CVE-2025-69236 third-party-advisory

raytha.com product

cve.org (CVE-2025-69241)

nvd.nist.gov (CVE-2025-69241)

Download JSON