CVE-2025-69246 PUBLISHED

Lack of bruteforce protection in Raytha CMS

Assigner: CERT-PL
Reserved: 30.12.2025 Published: 16.03.2026 Updated: 16.03.2026

Raytha CMS does not have any brute force protection mechanism implemented. It allows an attacker to send multiple automated logon requests without triggering lockout, throttling, or step-up challenges.

This issue was fixed in version 1.4.6.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor Raytha
Product Raytha
Versions Default: unaffected
  • affected from 0 to 1.4.6 (excl.)

Credits

  • Daniel Basta finder

References

Problem Types

  • CWE-307 Improper Restriction of Excessive Authentication Attempts CWE

Impacts

  • CAPEC-49 Password Brute Forcing