This issue was fixed in version 1.4.6.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Raytha CMS does not have any brute force protection mechanism implemented. It allows an attacker to send multiple automated logon requests without triggering lockout, throttling, or step-up challenges. This issue was fixed in version 1.4.6. | |
| Title | Lack of bruteforce protection in Raytha CMS | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T13:49:55.933Z
Reserved: 2025-12-30T08:44:21.411Z
Link: CVE-2025-69246
Updated: 2026-03-16T13:43:48.615Z
Status : Awaiting Analysis
Published: 2026-03-16T14:18:02.093
Modified: 2026-03-16T14:53:07.390
Link: CVE-2025-69246
No data.
OpenCVE Enrichment
No data.