-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.liferay.portal:release.portal.bom | maven | >= 7.0.0, < 7.4.3.88 | 7.4.3.88 |
| com.liferay.portal:release.dxp.bom | maven | >= 7.0, < 7.3.10.u30 | 7.3.10.u30 |
| com.liferay.portal:release.dxp.bom | maven | >= 7.4, < 7.4.13.u88 | 7.4.13.u88 |
The vulnerability stems from unescaped rendering of user-controlled input in the Service Class field. Liferay's MVC architecture suggests the edit form processing would involve: 1) An MVCActionCommand handling form submission (potential storage XSS vector if input isn't sanitized before persistence) and 2) A JSP view rendering the form field value without proper output encoding. While exact implementation details aren't public, these components are standard in Liferay's service access policy implementation patterns. Confidence is medium due to matching the vulnerability pattern with Liferay's typical architecture, though without patch diffs we can't confirm exact method names.
A Semantic Attack on Google Gemini - Read the Latest Research