This issue was fixed in version 1.4.6.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raytha
Raytha raytha |
|
| CPEs | cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Raytha
Raytha raytha |
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | "Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment. This issue was fixed in version 1.4.6. | |
| Title | Authenticated RCE in Raytha CMS | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T14:20:16.168Z
Reserved: 2026-01-19T12:32:08.960Z
Link: CVE-2025-15540
Updated: 2026-03-16T14:16:57.083Z
Status : Analyzed
Published: 2026-03-16T14:17:55.953
Modified: 2026-03-17T14:24:04.947
Link: CVE-2025-15540
No data.
OpenCVE Enrichment
No data.