This issue was fixed in version 1.4.6.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raytha
Raytha raytha |
|
| CPEs | cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Raytha
Raytha raytha |
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to attacker controlled domain. The attacker (who knows the victim's email address) can force the server to send an email with password reset link pointing to the domain from spoofed header. When victim clicks the link, browser sends request to the attacker’s domain with the token in the path allowing the attacker to capture the token. This allows the attacker to reset victim's password and take over the victim's account. This issue was fixed in version 1.4.6. | |
| Title | Header Poisoning in Raytha CMS | |
| Weaknesses | CWE-348 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T13:49:56.666Z
Reserved: 2025-12-30T08:44:21.410Z
Link: CVE-2025-69240
Updated: 2026-03-16T13:43:59.410Z
Status : Analyzed
Published: 2026-03-16T14:18:01.207
Modified: 2026-03-16T19:30:42.687
Link: CVE-2025-69240
No data.
OpenCVE Enrichment
No data.