Miggo Logo

CVE-2025-43753: Liferay Portal Reflected Cross-Site Scripting Vulnerability via Form Container

N/A

CVSS Score

Basic Information

EPSS Score
0.36325%
Published
8/22/2025
Updated
8/22/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay:com.liferay.layout.taglibmaven< 16.1.3216.1.32

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis of the provided commits, particularly 6ebe926008776c3f741f989a884ad07f02a79d9f, points directly to a vulnerability within the getSuccessMessage method of the RenderLayoutStructureDisplayContext class. The vulnerability is a classic reflected XSS, where user-controllable input (in this case, a success message associated with a form) is rendered on the page without proper output encoding or sanitization.

The patch introduces a call to HtmlUtil.escape() on the success message string before it is returned. This is a clear indication that the function was previously vulnerable to HTML and script injection. The accompanying test commits, such as d835c7331e38e048972ab4b8cf3106fc6767015f, confirm this by adding a test case that injects a <script> tag into the success message and asserts that the output is correctly escaped. Therefore, any runtime profile capturing the exploitation of this vulnerability would show the com.liferay.layout.taglib.internal.display.context.RenderLayoutStructureDisplayContext.getSuccessMessage function in the stack trace as it processes the malicious input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r**l**t** *ross-sit* s*riptin* (XSS) vuln*r**ility in t** Li**r*y Port*l *.*.*.** t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*r

Reasoning

T** *n*lysis o* t** provi*** *ommits, p*rti*ul*rly `****************************************`, points *ir**tly to * vuln*r**ility wit*in t** `**tSu***ssM*ss***` m*t*o* o* t** `R*n**rL*youtStru*tur**ispl*y*ont*xt` *l*ss. T** vuln*r**ility is * *l*ssi*