CVE-2025-43778
Description
A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.11, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.20 allows an remote authenticated attacker to inject JavaScript through the name of a fieldset in Kaleo Forms Admin. The malicious payload is stored and executed without proper sanitization or escaping.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.liferay:com.liferay.portal.workflow.kaleo.forms.webMaven | >= 5.0.3, < 5.0.107 | 5.0.107 |
Affected products
2- Liferay/DXPv5Range: 2024.Q1.1
Patches
1a540e050d0d9LPD-62508 Escape structure.getName(locale) in fields.jsp
1 file changed · +1 −1
modules/dxp/apps/portal-workflow-kaleo-forms/portal-workflow-kaleo-forms-web/src/main/resources/META-INF/resources/admin/process/fields.jsp+1 −1 modified@@ -72,7 +72,7 @@ JSONArray availableDefinitionsJSONArray = JSONFactoryUtil.createJSONArray(); ).put( "definitionId", structure.getStructureId() ).put( - "definitionName", structure.getName(locale) + "definitionName", HtmlUtil.escapeAttribute(structure.getName(locale)) )); %>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.