This issue was fixed in version 1.4.6.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raytha
Raytha raytha |
|
| CPEs | cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Raytha
Raytha raytha |
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Raytha CMS is vulnerable to Server-Side Request Forgery in the “Themes - Import from URL” feature. It allows an attacker with high privileges to provide the URL for redirecting server-side HTTP request. This issue was fixed in version 1.4.6. | |
| Title | Server-Site Request Forgery in Raytha CMS | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T13:49:56.870Z
Reserved: 2025-12-30T08:44:21.410Z
Link: CVE-2025-69239
Updated: 2026-03-16T13:44:01.879Z
Status : Analyzed
Published: 2026-03-16T14:18:01.010
Modified: 2026-03-16T19:31:17.540
Link: CVE-2025-69239
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:02:38Z