Liferay Portal and Liferay DXP vulnerable to store Cross-site Scripting
Moderate severity
GitHub Reviewed
Published
Sep 9, 2025
to the GitHub Advisory Database
•
Updated Sep 10, 2025
Package
Affected versions
>= 7.4, <= 7.4.13.u92
>= 2024.Q1.1, <= 2024.Q1.19
>= 2024.Q2.0, <= 2024.Q2.13
>= 2024.Q3.0, <= 2024.Q3.13
>= 2024.Q4.0, <= 2024.Q4.7
>= 2025.Q1.0, <= 2025.Q1.16
>= 2025.Q2.0, <= 2025.Q2.9
Patched versions
2024.Q1.20
2025.Q1.17
2025.Q2.10
Description
Published by the National Vulnerability Database
Sep 9, 2025
Published to the GitHub Advisory Database
Sep 9, 2025
Reviewed
Sep 10, 2025
Last updated
Sep 10, 2025
A stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.9, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows an remote authenticated attacker to inject JavaScript through Custom Object field label. The malicious payload is stored and executed through Process Builder's Configuration tab without proper escaping.
References