CVE-2025-43787
Description
A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q3.0, 2025.Q2.0 through 2025.Q2.12, 2025.Q1.0 through 2025.Q1.17, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.20 allows an remote authenticated attacker to inject JavaScript through the organization site names. The malicious payload is stored and executed without proper sanitization or escaping.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.liferay:com.liferay.users.admin.webMaven | >= 6.0.6, < 11.0.33 | 11.0.33 |
Affected products
2- Liferay/DXPv5Range: 2024.Q1.1
Patches
1b230afddd512LPD-62301 fix name when returning site from selection modal
1 file changed · +1 −1
modules/apps/users-admin/users-admin-web/src/main/resources/META-INF/resources/user/sites.jsp+1 −1 modified@@ -163,7 +163,7 @@ currentURLObj.setParameter("historyKey", liferayPortletResponse.getNamespace() + onSelect: (selectedItem) => { if (selectedItem) { const entityId = selectedItem.groupid; - const entityName = selectedItem.groupdescriptivename; + const entityName = A.Escape.html(selectedItem.groupdescriptivename); const label = Liferay.Util.sub( '<liferay-ui:message key="remove-x" />', entityName
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.