Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay/com.liferay.expando.web
  4. ›
  5. CVE-2025-43738

CVE-2025-43738: Liferay Portal Reflected Cross-Site Scripting Vulnerability in displayType Parameter

August 19, 2025

A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8, 2025.Q1.0 through 2025.Q1.15, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.19 allows a remote authenticated user to inject JavaScript code via _com_liferay_expando_web_portlet_ExpandoPortlet_displayType parameter.

Liferay Portal is fixed on the master branch from commit acc4771.

References

  • github.com/advisories/GHSA-cwgh-r52j-xh6c
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/acc477143b50de2138854548bc5bad06677e708a
  • liferay.atlassian.net/browse/LPE-18290
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43738
  • nvd.nist.gov/vuln/detail/CVE-2025-43738

Code Behaviors & Features

Detect and mitigate CVE-2025-43738 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 5.0.59

Solution

Unfortunately, there is no solution available yet.

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

maven/com.liferay/com.liferay.expando.web/CVE-2025-43738.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 23 Aug 2025 00:19:05 +0000.