CVE-2025-43815

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Liferay Portal and DXP allows attackers to inject malicious scripts via the backURLTitle parameter on the page configuration page. This affects users of Liferay Portal 7.4.3.102-7.4.3.110 and Liferay DXP 2023.Q4.0-2023.Q4.2 and 2023.Q3.5. Attackers can execute arbitrary JavaScript in victims' browsers when they visit a specially crafted URL.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.3.102 through 7.4.3.110; Liferay DXP 2023.Q4.0 through 2023.Q4.2 and 2023.Q3.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations; requires access to the page configuration page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal session cookies, perform actions as authenticated users, redirect to phishing sites, or install malware via browser exploitation.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the affected page through injected content.

🟢

If Mitigated

Limited impact if input validation/sanitization is enforced or if the attack requires user interaction with malicious links.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious URL with the vulnerable parameter; victim must click the link while authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.111+; Liferay DXP 2023.Q4.3+ or 2023.Q3.6+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43815

Restart Required: No

Instructions:

1. Download the latest patch from Liferay's customer portal. 2. Apply the patch according to Liferay's patching guide. 3. Verify the fix by testing the vulnerable parameter.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement a web application firewall (WAF) or custom filter to sanitize the backURLTitle parameter.

🧯 If You Can't Patch

  • Restrict access to the page configuration page to trusted users only.
  • Implement Content Security Policy (CSP) headers to mitigate script execution.

🔍 How to Verify

Check if Vulnerable:

Test by injecting a script payload into the com_liferay_layout_admin_web_portlet_GroupPagesPortlet_backURLTitle parameter and checking if it executes.

Check Version:

Check Liferay version via Control Panel > Server Administration > Properties or server logs.

Verify Fix Applied:

After patching, attempt the same injection; script should not execute and input should be sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing malicious script patterns in URL parameters
  • Unusual access to page configuration pages

Network Indicators:

  • HTTP requests with script tags or JavaScript in the backURLTitle parameter

SIEM Query:

source="liferay.log" AND (backURLTitle CONTAINS "<script>" OR backURLTitle CONTAINS "javascript:")

🔗 References

📤 Share & Export