Miggo Logo

CVE-2025-43769: Liferay Portal vulnerable to Stored XSS in Components portlet

N/A

CVSS Score

Basic Information

EPSS Score
0.40929%
Published
8/23/2025
Updated
8/25/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay:com.liferay.plugins.admin.webmaven< 5.0.365.0.36

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis of the provided commit 0249230a00a8ab42a5edaf6bca1bcf594525c0e9 clearly indicates a stored cross-site scripting (XSS) vulnerability in the portlets.jspf file. The patch applies HTML escaping to the title variable, which was previously rendered directly to the page. This lack of output sanitization is the root cause of the vulnerability. An attacker could create a portlet with a malicious title containing a script. When an administrator views the list of portlets in the 'Components' tab, the malicious script would execute in their browser, leading to potential account takeover or other malicious actions. The vulnerable code is located in a JSP fragment file, which is included in a larger JSP page for rendering the UI. Therefore, the JSP file itself is identified as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Stor** *ross-sit* s*riptin* (XSS) vuln*r**ility in Li**r*y Port*l *.*.* t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.** *n* *.* ** t*rou** up**t* ** *llows r*mot* *tt**k*rs to

Reasoning

T** *n*lysis o* t** provi*** *ommit `****************************************` *l**rly in*i**t*s * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility in t** `portl*ts.jsp*` *il*. T** p*t** *ppli*s *TML *s**pin* to t** `titl*` v*ri**l*, w*i** w*s pr*viou