"Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment.
This issue was fixed in version 1.4.6.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2026/03/CVE-2025-69236 | Third Party Advisory |
| https://raytha.com | Product |
Configurations
History
17 Mar 2026, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Raytha raytha
Raytha |
|
| References | () https://cert.pl/en/posts/2026/03/CVE-2025-69236 - Third Party Advisory | |
| References | () https://raytha.com - Product |
16 Mar 2026, 14:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:17
Updated : 2026-03-17 14:24
NVD link : CVE-2025-15540
Mitre link : CVE-2025-15540
CVE.ORG link : CVE-2025-15540
JSON object : View
Products Affected
raytha
- raytha
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
