Home

Description

A reflected cross-site scripting (XSS) vulnerability, resulting from a regression, has been identified in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.9, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 allows a remote, authenticated attacker to inject and execute JavaScript code via the _com_liferay_dynamic_data_mapping_web_portlet_DDMPortlet_definition parameter. The malicious payload is executed within the victim's browser when they access a URL that includes the crafted parameter.

PUBLISHED Reserved 2025-10-09 | Published 2025-10-22 | Updated 2025-10-22 | Assigner Liferay




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

7.4.0 (maven)
affected

Default status
unaffected

2024.Q1.1 (maven)
affected

2024.Q2.1 (maven)
affected

2024.Q3.1 (maven)
affected

2024.Q4.0 (maven)
affected

2025.Q1.0 (maven)
affected

2025.Q2.0 (maven)
affected

References

liferay.dev/...-/asset_publisher/jekt/content/CVE-2025-62248

cve.org (CVE-2025-62248)

nvd.nist.gov (CVE-2025-62248)

Download JSON