Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay/com.liferay.dynamic.data.mapping.form.field.type
  4. ›
  5. CVE-2025-43791

CVE-2025-43791: Liferay Portal vulnerable to Cross-site Scripting

September 15, 2025

Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.3.0 through 7.4.3.111, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92 and 7.3 GA through update 36 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a “Rich Text” type field to (1) a web content structure, (2) a Documents and Media Document Type , or (3) custom assets that uses the Data Engine’s module Rich Text field.

References

  • github.com/advisories/GHSA-5c6v-fqcw-w6q5
  • github.com/liferay/liferay-portal
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43791
  • nvd.nist.gov/vuln/detail/CVE-2025-43791

Code Behaviors & Features

Detect and mitigate CVE-2025-43791 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.0.167

Fixed versions

  • 6.0.167

Solution

Upgrade to version 6.0.167 or above.

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

maven/com.liferay/com.liferay.dynamic.data.mapping.form.field.type/CVE-2025-43791.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 28 Sep 2025 12:18:56 +0000.