CVE-2025-62248
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-22

Last updated on: 2025-12-11

Assigner: Liferay Inc.

Description
A reflected cross-site scripting (XSS) vulnerability, resulting from a regression, has been identified in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.9, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 allows a remote, authenticated attacker to inject and execute JavaScript code via the _com_liferay_dynamic_data_mapping_web_portlet_DDMPortlet_definition parameter. The malicious payload is executed within the victim's browser when they access a URL that includes the crafted parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-22
Last Modified
2025-12-11
Generated
2026-05-07
AI Q&A
2025-10-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
liferay digital_experience_platform From 2024.q1.1 (inc) to 2024.q1.20 (exc)
liferay digital_experience_platform From 2024.q2.0 (inc) to 2024.q2.13 (inc)
liferay digital_experience_platform From 2024.q3.1 (inc) to 2024.q3.13 (inc)
liferay digital_experience_platform From 2024.q4.0 (inc) to 2024.q4.7 (inc)
liferay liferay_portal From 7.4.0 (inc) to 7.4.3.132 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-62248 is a reflected cross-site scripting (XSS) vulnerability found in certain versions of Liferay Portal and Liferay DXP. It occurs due to a regression that allows a remote, authenticated attacker to inject and execute arbitrary JavaScript code via the _com_liferay_dynamic_data_mapping_web_portlet_DDMPortlet_definition parameter. When a victim accesses a URL containing this crafted parameter, the malicious script runs in their browser. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with authenticated access to inject malicious JavaScript code that executes in the browsers of other users who visit a crafted URL. This can lead to actions such as session hijacking, defacement, or redirection to malicious sites. However, the impact on confidentiality, integrity, and availability is considered low according to the CVSS score. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves identifying URLs containing the parameter `_com_liferay_dynamic_data_mapping_web_portlet_DDMPortlet_definition` with suspicious or crafted JavaScript payloads. You can monitor web server logs or use network traffic inspection tools to search for this parameter in HTTP requests. For example, using grep on access logs: `grep '_com_liferay_dynamic_data_mapping_web_portlet_DDMPortlet_definition' /path/to/access.log`. Additionally, web vulnerability scanners that support reflected XSS detection can be used to test the affected Liferay Portal or DXP instances. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the official patches or updates provided by Liferay. The vulnerability has been fixed in Liferay Portal master branch and in Liferay DXP versions 2024.Q1.20, 2025.Q1.17, and 2025.Q2.10. Until patches can be applied, restrict access to the affected Liferay versions to trusted users only, as the vulnerability requires authenticated access. Additionally, consider implementing web application firewall (WAF) rules to block requests containing the vulnerable parameter with suspicious payloads. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart