VYPR
Moderate severityNVD Advisory· Published Sep 29, 2025· Updated Sep 30, 2025

CVE-2025-43817

CVE-2025-43817

Description

Multiple reflected cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.4.3.74 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.6, 2023.Q3.1 through 2023.Q3.8, and 7.4 update 74 through update 92 allow remote attackers to inject arbitrary web script or HTML via the redirect parameter to (1) Announcements, or (2) Alerts.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.liferay.portal:release.portal.bomMaven
>= 7.4.3.74-ga74, < 7.4.3.112-ga1127.4.3.112-ga112

Affected products

2

Patches

1
40b9dcafccff

LPS-205549 Ensure escapedHREF is not evaluated in a JS context

https://github.com/liferay/liferay-portalDaniel SanzFeb 5, 2024via ghsa
1 file changed · +2 1
  • portal-web/docroot/html/taglib/aui/button/end.jsp+2 1 modified
    @@ -47,7 +47,8 @@
     					onClick="<%= onClick %>"
     				</c:when>
     				<c:when test="<%= Validator.isNotNull(escapedHREF) %>">
    -					onClick="Liferay.Util.navigate('<%= escapedHREF %>')"
    +					data-href="<%= escapedHREF %>"
    +					onClick="Liferay.Util.navigate(this.dataset.href)"
     				</c:when>
     			</c:choose>
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.