CVE-2025-43738
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-12-15
Assigner: Liferay Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liferay | digital_experience_platform | From 2024.q1.1 (inc) to 2024.q1.20 (exc) |
| liferay | digital_experience_platform | From 2024.Q2.1 (inc) to 2024.Q2.13 (inc) |
| liferay | digital_experience_platform | From 2024.q3.1 (inc) to 2024.q3.13 (inc) |
| liferay | digital_experience_platform | From 2024.q4.0 (inc) to 2024.q4.7 (inc) |
| liferay | digital_experience_platform | From 2025.Q1.0 (inc) to 2025.Q1.16 (exc) |
| liferay | digital_experience_platform | From 2025.Q2.0 (inc) to 2025.Q2.9 (exc) |
| liferay | liferay_portal | From 7.4.0 (inc) to 7.4.3.132 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-43738 is a reflected cross-site scripting (XSS) vulnerability in Liferay Portal and Liferay DXP. It occurs due to improper handling of the _com_liferay_expando_web_portlet_ExpandoPortlet_displayType parameter, allowing a remote authenticated user to inject arbitrary JavaScript code into the application. [1]
How can this vulnerability impact me? :
This vulnerability can allow a remote authenticated user to execute arbitrary JavaScript code in the context of the affected application. This could lead to unauthorized actions on behalf of other users, session hijacking, or other malicious activities that compromise the security and integrity of the application. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this reflected XSS vulnerability involves testing the _com_liferay_expando_web_portlet_ExpandoPortlet_displayType parameter for JavaScript injection. You can perform authenticated requests to the affected Liferay Portal or DXP versions and check if injected scripts are reflected and executed. For example, using curl with authentication to send a payload in the parameter and observing the response for script execution. Specific commands are not provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading affected Liferay Portal and DXP installations to fixed versions: Liferay Portal master branch or Liferay DXP versions 2025.Q2.9 and 2025.Q1.16 or later. Until upgrade, restrict access to the vulnerable parameter and ensure users have minimal privileges. Monitoring and applying security best practices for authenticated users can also help reduce risk. [1]