Miggo Logo

CVE-2025-43734: Liferay Portal 7.4.0 and Liferay DXP have a reflected cross-site scripting (XSS) vulnerability

N/A

CVSS Score

Basic Information

EPSS Score
0.38094%
Published
8/12/2025
Updated
8/13/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:release.portal.bommaven>= 7.4.0, <= 7.4.3.132
com.liferay.portal:release.dxp.bommaven>= 2024.q4.0, <= 2024.q4.7
com.liferay.portal:release.dxp.bommaven>= 2024.q3.0, <= 2024.q3.13
com.liferay.portal:release.dxp.bommaven>= 2024.q2.0, <= 2024.q2.13
com.liferay.portal:release.dxp.bommaven>= 2024.q1.0, <= 2024.q1.162024.q1.17
com.liferay.portal:release.dxp.bommaven>= 2025.q1.0, <= 2025.q1.102025.q1.11
com.liferay.portal:release.dxp.bommaven<= 7.4.13.u92

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists in the ButtonTag.java file, specifically within the writeLabel method. The vulnerability description highlights that a malicious payload injected into the 'first display label' field of a custom sort widget is executed by the clay button taglib. The provided commit patch confirms this. The patch modifies the writeLabel method to include HTML escaping using HtmlUtil.escape() on the _label variable before it is written to the page. This prevents the browser from interpreting any injected script as executable code. The vulnerable function, com.liferay.frontend.taglib.clay.servlet.taglib.ButtonTag.writeLabel, is therefore the key indicator of this vulnerability in a runtime profile, as it's the exact location where the unsanitized user input is rendered.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r**l**t** *ross-sit* s*riptin* (XSS) vuln*r**ility in t** Li**r*y Port*l *.*.* t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou

Reasoning

T** vuln*r**ility *xists in t** `*uttonT**.j*v*` *il*, sp**i*i**lly wit*in t** `writ*L***l` m*t*o*. T** vuln*r**ility **s*ription *i**li**ts t**t * m*li*ious p*ylo** inj**t** into t** '*irst *ispl*y l***l' *i*l* o* * *ustom sort wi***t is *x**ut** *y