5.4 CVE-2025-43744

 

A stored DOM-based Cross-Site Scripting (XSS) vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.5, 2025.Q1.0 through 2025.Q1.15, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 exists in the Asset Publisher configuration UI within the Source.js module. This vulnerability allows attackers to inject arbitrary JavaScript via DDM structure field labels which are then inserted into the DOM using innerHTML without proper encoding.
https://nvd.nist.gov/vuln/detail/CVE-2025-43744

Categories

CWE-79

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* >= 2024.q1.1 < 2024.q1.21
cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* >= 2024.q2.0 <= 2024.q2.13
cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* >= 2024.Q3.0 <= 2024.Q3.13
cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* >= 2024.q4.0 <= 2024.q4.7
cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* >= 2025.Q1.0 < 2025.Q1.16
cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* >= 2025.Q2.0 < 2025.Q2.6
cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*
cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:* >= 7.4.0 <= 7.4.3.132


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry