This issue was fixed in 1.4.6.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attacker can craft a malicious URL which, when opened by the authenticated victim, results in arbitrary JavaScript execution in the victim’s browser. This issue was fixed in 1.4.6. | |
| Title | Reflected XSS in Raytha CMS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T13:49:56.063Z
Reserved: 2025-12-30T08:44:21.411Z
Link: CVE-2025-69245
Updated: 2026-03-16T13:43:50.590Z
Status : Awaiting Analysis
Published: 2026-03-16T14:18:01.913
Modified: 2026-03-16T14:53:07.390
Link: CVE-2025-69245
No data.
OpenCVE Enrichment
No data.