Impact
The vulnerability in Raytha CMS allows an attacker with the ability to edit posts to store malicious code in the FieldValues[1].Value parameter. When a post is saved, the injected HTML and JavaScript is stored and rendered on the public page, executing any code present in the visitor’s browser. This stored cross‑site scripting flaw can be used to compromise the integrity of the website, deface content, or conduct phishing attacks against site visitors. The weakness is identified as CWE‑79 stored cross‑site scripting.
Affected Systems
Raytha CMS is affected in all releases prior to version 1.4.6. The fix was incorporated in release 1.4.6. All instances of Raytha deployed before that version should be considered vulnerable.
Risk and Exploitability
The CVSS base score is 5.1, indicating a medium severity. The EPSS score is less than 1 %, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access to the post‑editing interface; an attacker must have sufficient permissions to edit content. Because the payload is stored server‑side and executed in user browsers, the attack path relies on authenticated control of post content and the visitor’s interaction with the compromised page.
OpenCVE Enrichment