Impact
Raytha CMS is vulnerable to Stored Cross‑Site Scripting via the FieldValues[0].Value parameter used when creating pages. An authenticated attacker who has permission to create content can insert arbitrary HTML and JavaScript into this field. When a visitor later loads the edited page, the injected script runs in the visitor’s browser, potentially allowing an attacker to steal cookies, hijack sessions, deface the site, or execute further malicious actions. This is a classic Stored XSS (CWE-79) that compromises confidentiality and integrity of website users.
Affected Systems
All unpatched installations of Raytha CMS, specifically any version preceding 1.4.6, are affected. The vulnerability impacts the page creation functionality for users with sufficient permissions. Raytha’s officially documented fix is included in version 1.4.6, and it is recommended to upgrade or apply the relevant patch for all installations.
Risk and Exploitability
The CVSS score of 5.1 indicates medium severity, and the low EPSS (<1%) indicates a low likelihood that the vulnerability will be actively exploited. The vulnerability is not listed in the CISA KEV catalog, reinforcing its lower exploitation risk. Nonetheless, because the exploit requires authenticated access, internal actors with content‑creation privileges can leverage it. Institutions using Raytha should prioritize upgrading to 1.4.6 or later to eliminate the risk.
OpenCVE Enrichment