Liferay Portal and Liferay DXP vulnerable to store Cross-site Scripting
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Sep 9, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 10, 2025 
      
  
Package
Affected versions
>= 7.4, <= 7.4.13.u92
      >= 2024.Q1.1, <= 2024.Q1.19
      >= 2024.Q2.0, <= 2024.Q2.13
      >= 2024.Q3.0, <= 2024.Q3.13
      >= 2024.Q4.0, <= 2024.Q4.7
      >= 2025.Q1.0, <= 2025.Q1.16
      >= 2025.Q2.0, <= 2025.Q2.9
  Patched versions
2024.Q1.20
      2025.Q1.17
      2025.Q2.10
  Description
        Published by the National Vulnerability Database
      Sep 9, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 9, 2025 
    
  
        Reviewed
      Sep 10, 2025 
    
  
        Last updated
      Sep 10, 2025 
    
  
A stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.9, 2025.Q1.0 through 2025.Q1.16, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows an remote authenticated attacker to inject JavaScript through Custom Object field label. The malicious payload is stored and executed through Process Builder's Configuration tab without proper escaping.
References