5.1
CVE-2025-43787
- EPSS 0.18%
- Veröffentlicht 12.09.2025 16:09:33
- Zuletzt bearbeitet 15.09.2025 15:21:42
- Quelle security@liferay.com
- Teams Watchlist Login
- Unerledigt Login
A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q3.0, 2025.Q2.0 through 2025.Q2.12, 2025.Q1.0 through 2025.Q1.17, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.20 allows an remote authenticated attacker to inject JavaScript through the organization site names. The malicious payload is stored and executed without proper sanitization or escaping.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLiferay
≫
Produkt
Portal
Default Statusunaffected
Version <=
7.4.3.132
Version
7.4.0
Status
affected
HerstellerLiferay
≫
Produkt
DXP
Default Statusunaffected
Version <=
2024.Q1.20
Version
2024.Q1.1
Status
affected
Version <=
2024.Q2.13
Version
2024.Q2.0
Status
affected
Version <=
2024.Q3.13
Version
2024.Q3.0
Status
affected
Version <=
2024.Q4.7
Version
2024.Q4.0
Status
affected
Version <=
2025.Q1.16
Version
2025.Q1.0
Status
affected
Version <=
2025.Q2.12
Version
2025.Q2.0
Status
affected
Version
2025.Q3.0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.404 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
security@liferay.com | 5.1 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.