CVE-2025-15540
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with privileged access to execute malicious JavaScript code that can manipulate .NET components within the Raytha CMS application, potentially leading to unauthorized actions or data breaches. It requires the attacker to have the ability to write custom code using the platform's "functions" feature, which lacks proper security restrictions.
Technical Description
"Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment. This issue was fixed in version 1.4.6.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 16, 2026
22 days ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
raytha
Product
raytha