Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay/com.liferay.journal.web
  4. ›
  5. CVE-2025-43737

CVE-2025-43737: Liferay Portal Vulnerable to Cross-Site Scripting via backURL Paramter

August 19, 2025 (updated August 20, 2025)

A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8 and 2025.Q1.0 through 2025.Q1.15 allows a remote authenticated user to inject JavaScript code via _com_liferay_journal_web_portlet_JournalPortlet_backURL parameter.

References

  • github.com/advisories/GHSA-vjwr-cqwf-6q96
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/eded63b8822923f9392d94ba1818beb63629b79f
  • liferay.atlassian.net/browse/LPE-18292
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43737
  • nvd.nist.gov/vuln/detail/CVE-2025-43737

Code Behaviors & Features

Detect and mitigate CVE-2025-43737 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.0.196

Fixed versions

  • 5.0.196

Solution

Upgrade to version 5.0.196 or above.

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

maven/com.liferay/com.liferay.journal.web/CVE-2025-43737.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 23 Aug 2025 00:19:37 +0000.