Liferay XSS Vulnerability

MEDIUM (6.1) No Patch (51 days)

Threat Intelligence

Low Risk
EPSS Score: 0.04% chance of exploitation (percentile: 13%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Liferay Portal is a popular Java-based enterprise portal software used by organizations for intranet and extranet applications. This vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an attachment's filename, potentially leading to cross-site scripting (XSS) attacks.

Am I affected?

Affected versions: 7.4.3.101, 2023 If you don't recognise this software, you're probably not affected.

Affected Packages

maven: org.apache.liferay:portal-webapp

Affected Products

Liferay / Portal

How to fix

  1. Upgrade to Liferay Portal 7.4.3.101 or later.
    • Maven: Update your pom.xml dependency version
  2. Immediate mitigations:
    • Restrict network access to your Liferay instance (firewall it from the public internet)
    • Audit admin account activity for suspicious access patterns
    • Monitor for unauthorized token creation

References