CVE-2025-43734
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-12-16
Assigner: Liferay Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liferay | digital_experience_platform | From 2024.q1.1 (inc) to 2024.q1.16 (inc) |
| liferay | digital_experience_platform | From 2024.Q2.1 (inc) to 2024.Q2.13 (inc) |
| liferay | digital_experience_platform | From 2024.q3.1 (inc) to 2024.q3.13 (inc) |
| liferay | digital_experience_platform | From 2024.q4.0 (inc) to 2024.q4.7 (inc) |
| liferay | digital_experience_platform | From 2025.q1.0 (inc) to 2025.q1.10 (inc) |
| liferay | digital_experience_platform | 7.4 |
| liferay | liferay_portal | From 7.4.0 (inc) to 7.4.3.132 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reflected cross-site scripting (XSS) issue in certain versions of Liferay Portal and Liferay DXP. It allows a remote authenticated attacker to inject malicious JavaScript code into the "first display label" field of a custom sort widget configuration. When the page is refreshed, this injected code is reflected and executed by the clay button taglib, potentially compromising the security of the application and its users.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary JavaScript code in the context of the affected application. This can lead to unauthorized actions such as stealing user session tokens, defacing the website, redirecting users to malicious sites, or performing actions on behalf of the user without their consent, thereby compromising user data and application integrity.