Skip to main content

CVE-2025-43755: CWE-79: Cross-site Scripting in Liferay Portal

Medium
VulnerabilityCVE-2025-43755cvecve-2025-43755cwe-79
Published: Thu Aug 21 2025 (08/21/2025, 16:40:19 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 t through 7.4.3.132, and Liferay DXP 2025.Q2.0, 2025.Q1.0 through 2025.Q1.13, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.17 and 7.4 GA through update 92 allows an remote authenticated attacker to inject JavaScript into the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_type parameter.

AI-Powered Analysis

AILast updated: 08/21/2025, 17:03:47 UTC

Technical Analysis

CVE-2025-43755 is a stored cross-site scripting (XSS) vulnerability affecting multiple versions of the Liferay Portal and Liferay DXP products, specifically versions 7.4.0 through 7.4.3.132, and various quarterly releases from 2024.Q1 through 2025.Q2. The vulnerability resides in the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_type parameter, which improperly sanitizes input, allowing a remote authenticated attacker to inject malicious JavaScript code. Because this is a stored XSS, the injected script is saved on the server and executed in the browsers of users who access the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the portal. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that the attack vector is network-based, requires high privileges (authenticated user with elevated rights), no user interaction is needed, and the impact on confidentiality and integrity is low to limited, with availability unaffected. The vulnerability does not currently have known exploits in the wild, but the presence of stored XSS in a widely used enterprise portal platform poses a significant risk if weaponized. The vulnerability affects a broad range of Liferay versions, including long-term support releases, indicating that many organizations may be exposed if they have not applied patches or mitigations. The lack of available patches at the time of reporting increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations using Liferay Portal or Liferay DXP, this vulnerability could lead to unauthorized execution of malicious scripts within the context of the portal application. This can compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of legitimate users, especially given the requirement for high privilege authentication. Since Liferay is commonly used for intranet portals, customer-facing websites, and collaboration platforms, exploitation could disrupt business operations, lead to data breaches, and damage organizational reputation. The medium severity score suggests that while the impact is not catastrophic, it is significant enough to warrant immediate attention. European organizations in sectors such as finance, government, healthcare, and telecommunications, which often rely on Liferay for critical internal and external services, could face regulatory scrutiny under GDPR if personal data is compromised. Additionally, stored XSS vulnerabilities can be leveraged as a foothold for further attacks, including phishing or lateral movement within networks.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the affected portlet and parameter to only the most trusted and necessary users, minimizing the attack surface. 2. Apply strict input validation and output encoding on the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_type parameter to prevent injection of malicious scripts. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the portal. 4. Monitor logs for unusual activity related to the GroupPagesPortlet and review user actions for signs of exploitation attempts. 5. If patches become available, prioritize their deployment in test environments followed by production, ensuring compatibility and stability. 6. Educate administrators and users about the risks of XSS and the importance of reporting suspicious behavior. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this specific parameter. 8. Conduct regular security assessments and penetration tests focusing on portal components to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:24.865Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a74dc4ad5a09ad0012a5c4

Added to database: 8/21/2025, 4:48:04 PM

Last enriched: 8/21/2025, 5:03:47 PM

Last updated: 8/21/2025, 5:47:48 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats