CVE-2025-43804
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-11-07
Assigner: Liferay Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liferay | digital_experience_platform | 2023.q3.0 |
| liferay | digital_experience_platform | 2023.q3.1 |
| liferay | digital_experience_platform | 2023.q3.2 |
| liferay | digital_experience_platform | 2023.q3.3 |
| liferay | digital_experience_platform | 2023.q3.4 |
| liferay | digital_experience_platform | 2023.q4.0 |
| liferay | digital_experience_platform | 2023.q4.1 |
| liferay | liferay_portal | From 7.4.3.93 (inc) to 7.4.3.112 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-site scripting (XSS) issue in the Search widget of Liferay Portal versions 7.4.3.93 through 7.4.3.111 and Liferay DXP versions 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4. It allows remote attackers to inject arbitrary web scripts or HTML by exploiting the _com_liferay_portal_search_web_portlet_SearchPortlet_userId parameter, potentially leading to malicious code execution in users' browsers.
How can this vulnerability impact me? :
The impact of this vulnerability includes the possibility for attackers to execute arbitrary scripts in the context of the affected web application. This can lead to theft of user credentials, session hijacking, defacement of the website, or redirection to malicious sites, thereby compromising user security and trust.