CVE-2025-43811
Severity CVSS v4.0:
MEDIUM
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
29/09/2025
Last modified:
11/12/2025
Description
Multiple stored cross-site scripting (XSS) vulnerability in the related asset selector in Liferay Portal 7.4.3.50 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.4, 2023.Q3.1 through 2023.Q3.7, and 7.4 update 50 through update 92 allows remote authenticated attackers to inject arbitrary web script or HTML via a crafted payload injected into an asset author’s (1) First Name, (2) Middle Name, or (3) Last Name text field.
Impact
Base Score 4.0
4.80
Severity 4.0
MEDIUM
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* | 2023.Q3.1 (including) | 2023.Q3.8 (excluding) |
| cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:* | 2023.Q4.0 (including) | 2023.Q4.5 (excluding) |
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:* | ||
| cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



