Home

Description

A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.9, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows an remote authenticated attacker to inject JavaScript through Custom Object field label. The malicious payload is stored and executed through Process Builder's Configuration tab without proper escaping.

PUBLISHED Reserved 2025-04-17 | Published 2025-09-09 | Updated 2025-09-09 | Assigner Liferay




MEDIUM: 4.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-209 Generation of Error Message Containing Sensitive Information

Product status

Default status
unaffected

7.4.0 (maven)
affected

Default status
unaffected

7.4.13 (maven)
affected

2024.Q1.1 (maven)
affected

2024.Q2.0 (maven)
affected

2024.Q3.0 (maven)
affected

2024.Q4.0 (maven)
affected

2025.Q1.0 (maven)
affected

2025.Q2.0 (maven)
affected

Credits

NDIx reporter

References

liferay.dev/...-/asset_publisher/jekt/content/CVE-2025-43776

cve.org (CVE-2025-43776)

nvd.nist.gov (CVE-2025-43776)

Download JSON