CVE-2025-43742

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Liferay Portal and DXP allows unauthenticated remote attackers to inject malicious JavaScript via friendly URLs. This could enable session hijacking, credential theft, or content manipulation for users who click specially crafted links. Affected versions include Liferay Portal 7.4.0-7.4.3.132 and multiple DXP versions from 2024.Q1 through 2025.Q1.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.132; Liferay DXP 2025.Q1.0 through 2025.Q1.3, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.14, and 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires user interaction (clicking a malicious link).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full control of the portal, and deploys backdoors or exfiltrates sensitive data.

🟠

Likely Case

Attacker steals user session cookies to impersonate legitimate users, potentially accessing sensitive information or performing unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, the attack fails to execute JavaScript, resulting in no impact beyond failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting malicious URLs and convincing users to click them. No authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.133+, Liferay DXP 2025.Q1.4+, 2024.Q4.8+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.15+, and 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43742

Restart Required: No

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack following Liferay's deployment documentation. 3. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add a Content Security Policy header to restrict script execution from untrusted sources.

Add to web.xml or server configuration: Content-Security-Policy: script-src 'self'

Input Validation Filter

all

Deploy a servlet filter to sanitize friendly URL parameters before processing.

Implement custom filter to validate and encode URL parameters using OWASP Java Encoder

🧯 If You Can't Patch

  • Deploy a Web Application Firewall (WAF) with XSS protection rules enabled.
  • Educate users about phishing risks and implement URL filtering to block malicious links.

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject JavaScript via friendly URL parameters and checking if it executes in the response.

Check Version:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Verify Fix Applied:

After patching, repeat the test; JavaScript should be properly encoded and not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with script tags or JavaScript in friendly URL parameters in access logs

Network Indicators:

  • HTTP requests containing suspicious JavaScript payloads in URL parameters

SIEM Query:

source="liferay_access.log" AND (url="*<script*" OR url="*javascript:*" OR url="*onerror=*" OR url="*onload=*")

🔗 References

📤 Share & Export