Miggo Logo

CVE-2025-4576: Liferay Portal Reflected XSS in blogs-web

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
8/8/2025
Updated
8/8/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay:com.liferay.blogs.webmaven< 6.0.1396.0.139

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis of the provided commit afd9e7751fff6f573699ef1169da279957f72428 clearly indicates a reflected XSS vulnerability in the entry_cover_image_caption.jsp file. The patch itself demonstrates the vulnerability and the fix. The vulnerable code is within a JSP scriptlet, which means the JSP itself is the vulnerable component. The coverImageURL parameter, which is user-controllable, was being directly embedded into a CSS url() function within a style attribute. This allows an attacker to break out of the url() context and inject arbitrary HTML and JavaScript. The fix involves using HtmlUtil.escapeAttribute() to properly sanitize the coverImageURL parameter, preventing the injection of malicious code. Therefore, the identified vulnerable function is the JSP file itself, as it contains the code that processes and renders the malicious input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r**l**t** *ross-sit* s*riptin* (XSS) vuln*r**ility in t** Li**r*y Port*l *.*.* t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.* ,****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou*

Reasoning

T** *n*lysis o* t** provi*** *ommit `****************************************` *l**rly in*i**t*s * r**l**t** XSS vuln*r**ility in t** `*ntry_*ov*r_im***_**ption.jsp` *il*. T** p*t** its*l* **monstr*t*s t** vuln*r**ility *n* t** *ix. T** vuln*r**l* *o