Raytha

Raytha

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 16.03.2026 11:54:50
  • Zuletzt bearbeitet 16.03.2026 19:21:32

Raytha CMS does not have any brute force protection mechanism implemented. It allows an attacker to send multiple automated logon requests without triggering lockout, throttling, or step-up challenges. This issue was fixed in version 1.4.6.

  • EPSS 0.04%
  • Veröffentlicht 16.03.2026 11:54:42
  • Zuletzt bearbeitet 16.03.2026 19:22:28

Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attacker can craft a malicious URL which, when opened by the authenticated victim, results in arbitrary JavaScript execution in the victim’s browser. This i...

  • EPSS 0.04%
  • Veröffentlicht 16.03.2026 11:54:32
  • Zuletzt bearbeitet 16.03.2026 19:26:28

Raytha CMS is vulnerable to User Enumeration in password reset functionality. Difference in messages could allow an attacker to determine if the login is valid or not, enabling a brute force attack with valid logins. This issue was fixed in version ...

  • EPSS 0.04%
  • Veröffentlicht 16.03.2026 11:54:19
  • Zuletzt bearbeitet 16.03.2026 19:27:58

Raytha CMS is vulnerable to reflected XSS via the backToListUrl parameter. An attacker can craft a malicious URL which, when opened by authenticated victim, results in arbitrary JavaScript execution in the victim’s browser. This issue was fixed in v...

  • EPSS 0.03%
  • Veröffentlicht 16.03.2026 11:53:55
  • Zuletzt bearbeitet 16.03.2026 19:28:08

Raytha CMS is vulnerable to Stored XSS via FirstName and LastName parameters in profile editing functionality. Authenticated attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issu...

  • EPSS 0.02%
  • Veröffentlicht 16.03.2026 11:53:41
  • Zuletzt bearbeitet 16.03.2026 19:30:42

Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to attacker controlled domain. The attacker (who knows the victim's email address) can force the server to send an email with password reset link pointing to the domain from ...

  • EPSS 0.03%
  • Veröffentlicht 16.03.2026 11:53:33
  • Zuletzt bearbeitet 16.03.2026 19:31:17

Raytha CMS is vulnerable to Server-Side Request Forgery in the “Themes - Import from URL” feature. It allows an attacker with high privileges to provide the URL for redirecting server-side HTTP request. This issue was fixed in version 1.4.6.

  • EPSS 0.02%
  • Veröffentlicht 16.03.2026 11:53:11
  • Zuletzt bearbeitet 16.03.2026 19:31:41

Raytha CMS is vulnerable to Cross-Site Request Forgery across multiple endpoints. Attacker can craft special website, which when visited by the authenticated victim, will automatically send POST request to the endpoint (e. x. deletion of the data) wi...

  • EPSS 0.02%
  • Veröffentlicht 16.03.2026 11:53:03
  • Zuletzt bearbeitet 16.03.2026 19:31:55

Raytha CMS is vulnerable to Stored XSS via FieldValues[0].Value parameter in page creation functionality. Authenticated attacker with permissions to create content can inject arbitrary HTML and JS into website, which will be rendered/executed when vi...

  • EPSS 0.02%
  • Veröffentlicht 16.03.2026 11:52:54
  • Zuletzt bearbeitet 16.03.2026 19:32:09

Raytha CMS is vulnerable to Stored XSS via FieldValues[1].Value parameter in post editing functionality. Authenticated attacker with permissions to edit posts can inject arbitrary HTML and JS into website, which will be rendered/executed when visitin...