Moderate severityNVD Advisory· Published Aug 20, 2025· Updated Aug 20, 2025
CVE-2025-43741
CVE-2025-43741
Description
A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.3, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.14 and 7.4 GA through update 92 allows an remote authenticated attacker to inject JavaScrip in the _com_liferay_users_admin_web_portlet_UsersAdminPortlet_assetTagNames parameter
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.liferay.portal:release.portal.bomMaven | >= 7.4.0-ga1, <= 7.4.3.132-ga132 | — |
Affected products
2- Liferay/DXPv5Range: 7.4.13
Patches
1264f4f91aa4fLPD-51123 Escape label
1 file changed · +1 −1
modules/apps/asset/asset-taglib/src/main/resources/META-INF/resources/asset_tags_selector/page.jsp+1 −1 modified@@ -20,7 +20,7 @@ List<Map<String, String>> selectedItems = (List<Map<String, String>>)data.get("s for (Map<String, String> selectedItem : selectedItems) { %> - <input name="<%= (String)data.get("inputName") %>" type="hidden" value="<%= selectedItem.get("value") %>" /> + <input name="<%= (String)data.get("inputName") %>" type="hidden" value="<%= HtmlUtil.escape(selectedItem.get("value")) %>" /> <% }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-j6p8-g3rj-ghpmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-43741ghsaADVISORY
- github.com/liferay/liferay-portal/commit/264f4f91aa4f8373c5a9cc44420edf1689384cbbghsaWEB
- liferay.atlassian.net/browse/LPE-18193ghsaWEB
- liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43741ghsaWEB
News mentions
0No linked articles in our index yet.