This issue was fixed in version 1.4.6.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Raytha CMS is vulnerable to Stored XSS via FirstName and LastName parameters in profile editing functionality. Authenticated attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issue was fixed in version 1.4.6. | |
| Title | Stored XSS in Raytha CMS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T13:49:56.532Z
Reserved: 2025-12-30T08:44:21.410Z
Link: CVE-2025-69241
Updated: 2026-03-16T13:43:56.921Z
Status : Awaiting Analysis
Published: 2026-03-16T14:18:01.390
Modified: 2026-03-16T14:53:07.390
Link: CVE-2025-69241
No data.
OpenCVE Enrichment
No data.