CVE-2025-15540

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with privileged access to execute malicious JavaScript code that can manipulate .NET components within the Raytha CMS application, potentially leading to unauthorized actions or data breaches. It requires the attacker to have the ability to write custom code using the platform's "functions" feature, which lacks proper security restrictions.

Technical Description

"Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment. This issue was fixed in version 1.4.6.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,368($1K-$5K)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Mar 16, 2026

22 days ago

Last Modified

Mar 17, 2026

21 days ago

Vendor

raytha

Product

raytha