Description
Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attacker can craft a malicious URL which, when opened by the authenticated victim, results in arbitrary JavaScript execution in the victim’s browser.

This issue was fixed in 1.4.6.
Published: 2026-03-16
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS) – arbitrary JavaScript execution
Action: Patch
AI Analysis

Impact

Raytha CMS suffers from a reflected cross‑site scripting (XSS) flaw in the logon feature through the returnUrl parameter. When an authenticated user follows a specially crafted URL, the application inserts the unescaped returnUrl value into the page, allowing an attacker to inject and execute arbitrary JavaScript in the victim’s browser. This can lead to theft of credentials, session hijacking, or other malicious client‑side actions.

Affected Systems

The vulnerability is present in all Raytha CMS releases prior to version 1.4.6. The affected product is Raytha CMS, as identified by the vendor and the CPE string cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*. Attackers can exploit any deployed instance of these earlier versions via the logon flow.

Risk and Exploitability

The CVSS score of 5.1 indicates a medium severity impact, while the EPSS score below 1% shows a low probability of widespread exploitation. The flaw is not listed in CISA’s KEV catalog, implying no confirmed large‑scale exploitation reports. Exploitation requires an authenticated user to click a malicious link and the attacker must be able to provide the crafted URL; thus the damage is limited to the scope of that logged‑in account. Organizations using pre‑1.4.6 releases should apply the vendor fix promptly to eliminate the risk of client‑side compromise.

Generated by OpenCVE AI on March 17, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Raytha CMS to version 1.4.6 or later

Generated by OpenCVE AI on March 17, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Raytha
Raytha raytha
CPEs cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:*
Vendors & Products Raytha
Raytha raytha
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attacker can craft a malicious URL which, when opened by the authenticated victim, results in arbitrary JavaScript execution in the victim’s browser. This issue was fixed in 1.4.6.
Title Reflected XSS in Raytha CMS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-03-16T13:49:56.063Z

Reserved: 2025-12-30T08:44:21.411Z

Link: CVE-2025-69245

cve-icon Vulnrichment

Updated: 2026-03-16T13:43:50.590Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:18:01.913

Modified: 2026-03-16T19:22:28.380

Link: CVE-2025-69245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:34Z

Weaknesses