4.6
CVE-2025-43776
- EPSS 0.2%
- Veröffentlicht 09.09.2025 14:18:53
- Zuletzt bearbeitet 09.09.2025 16:28:43
- Quelle security@liferay.com
- CVE-Watchlists
- Unerledigt
A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.9, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows an remote authenticated attacker to inject JavaScript through Custom Object field label. The malicious payload is stored and executed through Process Builder's Configuration tab without proper escaping.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLiferay
≫
Produkt
Portal
Default Statusunaffected
Version <=
7.4.3.132
Version
7.4.0
Status
affected
HerstellerLiferay
≫
Produkt
DXP
Default Statusunaffected
Version <=
7.4.13-u92
Version
7.4.13
Status
affected
Version <=
2024.Q1.19
Version
2024.Q1.1
Status
affected
Version <=
2024.Q2.13
Version
2024.Q2.0
Status
affected
Version <=
2024.Q3.13
Version
2024.Q3.0
Status
affected
Version <=
2024.Q4.7
Version
2024.Q4.0
Status
affected
Version <=
2025.Q1.16
Version
2025.Q1.0
Status
affected
Version <=
2025.Q2.9
Version
2025.Q2.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.2% | 0.425 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@liferay.com | 4.6 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-209 Generation of Error Message Containing Sensitive Information
The product generates an error message that includes sensitive information about its environment, users, or associated data.