Ad

CVE-2025-15540

HIGH CVSS 4.0: 8.6 EPSS 0.06%
Updated Mar 17, 2026
Raytha
Parameter Value
CVSS 8.6 (HIGH)
Affected Versions before 1.4.6
Fixed In 1.4.6
Type CWE-94 (Code Injection)
Vendor Raytha
Public PoC No

"Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment. This issue was fixed in version 1.4.6.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
High
Admin privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Raytha Raytha
cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:*
1.4.6