4.6

CVE-2025-43776 The Process Builder's Configuration tab fails to properly escape stored JavaScript code

Description

A Stored cross-site scripting vulnerability in the Liferay Portal and Liferay DXP allows an remote authenticated attacker to inject JavaScript through Custom Object field label. The malicious payload is stored and executed through Process Builder's Configuration tab without proper escaping.

Severity

4.6 (CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)

Affected Version(s)

  • Liferay Portal 7.4.0 through 7.4.3.132
  • Liferay DXP 7.4 GA through U92
  • Liferay DXP 2024.Q1.1 through DXP 2024.Q1.19
  • Liferay DXP 2024.Q2.0 through DXP 2024.Q2.13
  • Liferay DXP 2024.Q3.0 through DXP 2024.Q3.13
  • Liferay DXP 2024.Q4.0 through DXP 2024.Q4.7
  • Liferay DXP 2025.Q1.0 through DXP 2025.Q1.16
  • Liferay DXP 2025.Q2.0 through DXP 2025.Q2.9

Fixed Version(s)

  • Liferay Portal fixed on master branch
  • Liferay DXP 2024.Q1.20
  • Liferay DXP 2025.Q1.17
  • Liferay DXP 2025.Q2.10

Acknowledgments

This issue was reported by NDIx

Publication Date: 

syyskuuta 9, 2025

Found a Bug?

If you have found, or think you have found a bug, help us to help you by letting us know!

Found a Security Vulnerability?

There's a different process available if you have a security issue to report...

Hall of Fame!

Raise your profile - report security vulnerabilities and enter the Hall of Fame!