This issue was fixed in version 1.5.0.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raytha
Raytha raytha |
|
| CPEs | cpe:2.3:a:raytha:raytha:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Raytha
Raytha raytha |
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Raytha CMS is vulnerable to User Enumeration in password reset functionality. Difference in messages could allow an attacker to determine if the login is valid or not, enabling a brute force attack with valid logins. This issue was fixed in version 1.5.0. | |
| Title | User enumeration in Raytha CMS | |
| Weaknesses | CWE-204 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-16T13:49:56.219Z
Reserved: 2025-12-30T08:44:21.411Z
Link: CVE-2025-69243
Updated: 2026-03-16T13:43:52.554Z
Status : Analyzed
Published: 2026-03-16T14:18:01.753
Modified: 2026-03-16T19:26:28.350
Link: CVE-2025-69243
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:02:35Z