GHSA-g8fh-pfw3-8rmr

Suggest an improvement
Source
https://github.com/advisories/GHSA-g8fh-pfw3-8rmr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-g8fh-pfw3-8rmr/GHSA-g8fh-pfw3-8rmr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g8fh-pfw3-8rmr
Aliases
  • CVE-2025-43787
Published
2025-09-12T18:31:10Z
Modified
2025-09-15T14:27:20.638784Z
Severity
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Liferay Portal's selection modal is vulnerable to XSS
Details

A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q3.0, 2025.Q2.0 through 2025.Q2.12, 2025.Q1.0 through 2025.Q1.17, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.20 allows an remote authenticated attacker to inject JavaScript through the organization site names. The malicious payload is stored and executed without proper sanitization or escaping.

Database specific
{
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed_at": "2025-09-15T13:54:10Z",
    "nvd_published_at": "2025-09-12T17:15:47Z"
}
References

Affected packages

Maven / com.liferay:com.liferay.users.admin.web

Package

Name
com.liferay:com.liferay.users.admin.web
View open source insights on deps.dev
Purl
pkg:maven/com.liferay/com.liferay.users.admin.web

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.6
Fixed
11.0.33

Affected versions

6.*

6.0.6
6.0.7
6.0.8
6.0.9
6.0.10
6.0.11
6.0.12
6.0.13
6.0.14
6.0.15
6.0.16
6.0.17
6.0.18
6.0.19
6.0.20
6.0.21
6.0.22
6.0.23
6.0.24
6.0.25
6.0.26
6.0.27
6.0.28
6.0.29
6.0.30
6.0.31
6.0.32
6.0.33
6.0.34
6.0.35
6.0.36
6.0.37
6.0.38
6.0.39
6.0.40
6.0.41
6.0.42
6.0.43
6.0.44
6.0.45
6.0.46
6.0.47
6.0.48
6.0.49
6.0.50
6.0.51
6.0.52
6.0.53
6.0.54
6.0.55
6.0.56
6.0.57
6.0.58
6.0.59
6.0.60
6.0.61
6.0.62
6.0.63
6.0.64
6.0.65
6.0.66
6.0.67
6.0.68
6.0.69
6.0.70
6.0.71
6.0.72
6.0.73
6.0.74
6.0.75
6.0.76
6.0.77
6.0.78
6.0.79
6.0.80
6.0.81
6.0.82
6.0.83
6.0.84
6.0.85
6.0.86
6.0.87
6.0.88
6.0.89
6.0.90
6.0.91
6.0.92
6.0.93
6.0.94
6.0.95
6.0.96
6.0.97
6.0.98
6.0.99
6.0.100
6.0.101
6.0.102
6.0.103
6.0.104
6.0.105
6.0.106
6.0.107
6.0.108
6.0.109
6.0.110
6.0.111
6.0.112
6.0.113
6.0.114
6.0.115

7.*

7.0.0
7.0.1

8.*

8.0.0
8.0.1
8.0.2

9.*

9.0.0
9.0.1
9.0.2

10.*

10.0.0
10.0.1
10.0.2
10.0.3
10.0.4
10.0.5

11.*

11.0.0
11.0.1
11.0.2
11.0.3
11.0.4
11.0.5
11.0.6
11.0.7
11.0.8
11.0.9
11.0.10
11.0.11
11.0.12
11.0.13
11.0.14
11.0.15
11.0.16
11.0.17
11.0.18
11.0.19
11.0.20
11.0.21
11.0.22
11.0.23
11.0.24
11.0.25
11.0.26
11.0.27
11.0.28
11.0.29
11.0.30
11.0.31