VYPR
Moderate severityNVD Advisory· Published Sep 9, 2025· Updated Sep 9, 2025

CVE-2025-43778

CVE-2025-43778

Description

A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.11, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.20 allows an remote authenticated attacker to inject JavaScript through the name of a fieldset in Kaleo Forms Admin. The malicious payload is stored and executed without proper sanitization or escaping.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.liferay:com.liferay.portal.workflow.kaleo.forms.webMaven
>= 5.0.3, < 5.0.1075.0.107

Affected products

2

Patches

1
a540e050d0d9

LPD-62508 Escape structure.getName(locale) in fields.jsp

1 file changed · +1 1
  • modules/dxp/apps/portal-workflow-kaleo-forms/portal-workflow-kaleo-forms-web/src/main/resources/META-INF/resources/admin/process/fields.jsp+1 1 modified
    @@ -72,7 +72,7 @@ JSONArray availableDefinitionsJSONArray = JSONFactoryUtil.createJSONArray();
     				).put(
     					"definitionId", structure.getStructureId()
     				).put(
    -					"definitionName", structure.getName(locale)
    +					"definitionName", HtmlUtil.escapeAttribute(structure.getName(locale))
     				));
     			%>
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.