CVE-2025-43760

5.4 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Liferay Portal/DXP allows authenticated remote attackers to inject malicious JavaScript via the PortalUtil.escapeRedirect function. This affects authenticated users across multiple Liferay versions. Successful exploitation could lead to session hijacking or unauthorized actions.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.132; Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.6, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.20, 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full administrative access, and potentially compromises the entire portal instance and connected systems.

🟠

Likely Case

Attacker steals user session cookies, performs unauthorized actions as the victim, or redirects users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, the attack fails to execute JavaScript, limiting impact to error messages or benign redirects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of vulnerable endpoints. Attackers need to craft malicious URLs containing JavaScript payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.133+, Liferay DXP 2025.Q1.5+, 2024.Q4.7+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.21+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43760

Restart Required: No

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack according to Liferay's deployment documentation. 3. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement a servlet filter or WAF rule to sanitize redirect parameters containing JavaScript patterns.

Implement custom filter in web.xml or configure WAF rules to block requests with script tags in redirect parameters

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS protection rules
  • Disable or restrict access to vulnerable endpoints if identified

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel > Configuration > Server Administration > System Information

Check Version:

Check Liferay build number in Control Panel or via server logs

Verify Fix Applied:

Verify installed fix pack version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect URLs containing script tags or JavaScript code in access logs
  • Multiple failed redirect attempts from single IP

Network Indicators:

  • HTTP requests with JavaScript payloads in redirect parameters
  • Unusual outbound connections following redirects

SIEM Query:

source="liferay_access.log" AND (url="*<script*" OR url="*javascript:*")

🔗 References

📤 Share & Export