CVE-2025-43760
📋 TL;DR
A reflected cross-site scripting (XSS) vulnerability in Liferay Portal/DXP allows authenticated remote attackers to inject malicious JavaScript via the PortalUtil.escapeRedirect function. This affects authenticated users across multiple Liferay versions. Successful exploitation could lead to session hijacking or unauthorized actions.
💻 Affected Systems
- Liferay Portal
- Liferay DXP
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attacker steals administrator session cookies, gains full administrative access, and potentially compromises the entire portal instance and connected systems.
Likely Case
Attacker steals user session cookies, performs unauthorized actions as the victim, or redirects users to malicious sites.
If Mitigated
With proper input validation and output encoding, the attack fails to execute JavaScript, limiting impact to error messages or benign redirects.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of vulnerable endpoints. Attackers need to craft malicious URLs containing JavaScript payloads.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Liferay Portal 7.4.3.133+, Liferay DXP 2025.Q1.5+, 2024.Q4.7+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.21+, 7.4 update 93+
Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43760
Restart Required: No
Instructions:
1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack according to Liferay's deployment documentation. 3. Verify the patch was applied successfully.
🔧 Temporary Workarounds
Input Validation Filter
allImplement a servlet filter or WAF rule to sanitize redirect parameters containing JavaScript patterns.
Implement custom filter in web.xml or configure WAF rules to block requests with script tags in redirect parameters
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) with XSS protection rules
- Disable or restrict access to vulnerable endpoints if identified
🔍 How to Verify
Check if Vulnerable:
Check Liferay version via Control Panel > Configuration > Server Administration > System Information
Check Version:
Check Liferay build number in Control Panel or via server logs
Verify Fix Applied:
Verify installed fix pack version matches or exceeds patched versions listed in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual redirect URLs containing script tags or JavaScript code in access logs
- Multiple failed redirect attempts from single IP
Network Indicators:
- HTTP requests with JavaScript payloads in redirect parameters
- Unusual outbound connections following redirects
SIEM Query:
source="liferay_access.log" AND (url="*<script*" OR url="*javascript:*")