Raytha CMS is vulnerable to Cross-Site Request Forgery across multiple endpoints. Attacker can craft special website, which when visited by the authenticated victim, will automatically send POST request to the endpoint (e. x. deletion of the data) without enforcing token verification.
This issue was fixed in version 1.4.6.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2026/03/CVE-2025-69236 | Third Party Advisory |
| https://raytha.com | Product |
Configurations
History
16 Mar 2026, 19:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert.pl/en/posts/2026/03/CVE-2025-69236 - Third Party Advisory | |
| References | () https://raytha.com - Product | |
| CPE | cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:* | |
| First Time |
Raytha raytha
Raytha |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
16 Mar 2026, 14:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:18
Updated : 2026-03-16 19:31
NVD link : CVE-2025-69238
Mitre link : CVE-2025-69238
CVE.ORG link : CVE-2025-69238
JSON object : View
Products Affected
raytha
- raytha
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
