CVE-2025-69241

Raytha CMS is vulnerable to Stored XSS via FirstName and LastName parameters in profile editing functionality. Authenticated attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issue was fixed in version 1.4.6.
References
Link Resource
https://cert.pl/en/posts/2026/03/CVE-2025-69236 Third Party Advisory
https://raytha.com Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:*

History

16 Mar 2026, 19:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Raytha raytha
Raytha
CPE cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:*
References () https://cert.pl/en/posts/2026/03/CVE-2025-69236 - () https://cert.pl/en/posts/2026/03/CVE-2025-69236 - Third Party Advisory
References () https://raytha.com - () https://raytha.com - Product

16 Mar 2026, 14:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 14:18

Updated : 2026-03-16 19:28


NVD link : CVE-2025-69241

Mitre link : CVE-2025-69241

CVE.ORG link : CVE-2025-69241


JSON object : View

Products Affected

raytha

  • raytha
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')