Description
A Stored cross-site scripting vulnerability in the Liferay Portal and Liferay DXP allows an remote authenticated attacker to inject JavaScript through Custom Object field label. The malicious payload is stored and executed through Process Builder's Configuration tab without proper escaping.
Severity
4.6 (CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)
Affected Version(s)
- Liferay Portal 7.4.0 through 7.4.3.132
- Liferay DXP 7.4 GA through U92
- Liferay DXP 2024.Q1.1 through DXP 2024.Q1.19
- Liferay DXP 2024.Q2.0 through DXP 2024.Q2.13
- Liferay DXP 2024.Q3.0 through DXP 2024.Q3.13
- Liferay DXP 2024.Q4.0 through DXP 2024.Q4.7
- Liferay DXP 2025.Q1.0 through DXP 2025.Q1.16
- Liferay DXP 2025.Q2.0 through DXP 2025.Q2.9
Fixed Version(s)
- Liferay Portal fixed on master branch
- Liferay DXP 2024.Q1.20
- Liferay DXP 2025.Q1.17
- Liferay DXP 2025.Q2.10
Acknowledgments
This issue was reported by NDIx
Publication Date:
Found a Bug?
If you have found, or think you have found a bug, help us to help you by letting us know!
Found a Security Vulnerability?
There's a different process available if you have a security issue to report...
Hall of Fame!
Raise your profile - report security vulnerabilities and enter the Hall of Fame!