Impact
Functions module in Raytha CMS allows privileged users to write custom JavaScript code. Because the system lacks sandboxing or access restrictions, the code executed can instantiate .NET components and perform arbitrary operations within the application’s hosting environment, leading to remote code execution and full control over the server.
Affected Systems
Affected vendor: Raytha (product: Raytha). All released versions prior to 1.4.6 contain the flaw; the issue was fixed in version 1.4.6.
Risk and Exploitability
The CVSS score of 8.6 classifies this as high severity. The EPSS score is below 1 % indicating a low probability of exploitation in the wild, and it is not listed in CISA’s KEV catalog. However, because the vulnerability requires authentication as a privileged user, an attacker who gains such access can exploit the flaw with the described attack path. The lack of sandboxing makes the impact significant, providing full control over the hosting environment.
OpenCVE Enrichment