CVE-2025-4388:
Liferay Portal Reflected XSS in marketplace-app-manager-web
6.9
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.liferay:com.liferay.marketplace.app.manager.web | maven | < 5.0.50 | 5.0.50 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided commit directly patches an XSS vulnerability in icon.jsp
. The vulnerability lies in the direct use of the iconURL
request parameter without sanitization. The patch adds HtmlUtil.escape()
to sanitize this input. JSP files are compiled into servlets, and the code within them is executed as part of the servlet's service method (typically _jspService
). Therefore, icon.jsp
itself can be considered the vulnerable component, as it processes the malicious input. The confidence is high because the patch directly addresses the XSS by escaping the user-controlled iconURL
parameter within this JSP file. While JSPs are compiled into Java classes, the vulnerable code is directly within the JSP, making it the most precise vulnerable function in this context for runtime analysis (as the JSP's compiled servlet name might vary or be less directly identifiable).