CWE
1188 79
EPSS
0.043%
Advisory Published
Advisory Published
Updated

CVE-2024-25610: XSS

First published: Tue Feb 20 2024(Updated: )

In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry’s content text field.

Credit: security@liferay.com security@liferay.com

Affected SoftwareAffected VersionHow to fix
maven/com.liferay.portal:com.liferay.portal.web<5.0.96
5.0.96
maven/com.liferay.portal:release.dxp.bom<7.2.10.fp19
7.2.10.fp19
maven/com.liferay.portal:release.dxp.bom>=7.3.0<7.3.10.u4
7.3.10.u4
maven/com.liferay.portal:release.dxp.bom>=7.4.0<7.4.13.u9
7.4.13.u9
maven/com.liferay.portal:release.portal.bom<7.4.3.13
7.4.3.13
Liferay 7.4 GA<7.2
Liferay 7.4 GA=7.2
Liferay 7.4 GA=7.2-fix_pack_1
Liferay 7.4 GA=7.2-fix_pack_10
Liferay 7.4 GA=7.2-fix_pack_11
Liferay 7.4 GA=7.2-fix_pack_12
Liferay 7.4 GA=7.2-fix_pack_13
Liferay 7.4 GA=7.2-fix_pack_14
Liferay 7.4 GA=7.2-fix_pack_15
Liferay 7.4 GA=7.2-fix_pack_16
Liferay 7.4 GA=7.2-fix_pack_17
Liferay 7.4 GA=7.2-fix_pack_18
Liferay 7.4 GA=7.2-fix_pack_2
Liferay 7.4 GA=7.2-fix_pack_3
Liferay 7.4 GA=7.2-fix_pack_4
Liferay 7.4 GA=7.2-fix_pack_5
Liferay 7.4 GA=7.2-fix_pack_6
Liferay 7.4 GA=7.2-fix_pack_7
Liferay 7.4 GA=7.2-fix_pack_8
Liferay 7.4 GA=7.2-fix_pack_9
Liferay 7.4 GA=7.2-service_pack_1
Liferay 7.4 GA=7.2-service_pack_2
Liferay 7.4 GA=7.2-service_pack_3
Liferay 7.4 GA=7.2-service_pack_4
Liferay 7.4 GA=7.2-service_pack_5
Liferay 7.4 GA=7.2-service_pack_6
Liferay 7.4 GA=7.3
Liferay 7.4 GA=7.3-fix_pack_1
Liferay 7.4 GA=7.3-fix_pack_2
Liferay 7.4 GA=7.3-service_pack_1
Liferay 7.4 GA=7.3-service_pack_3
Liferay 7.4 GA=7.4
Liferay 7.4 GA=7.4-update1
Liferay 7.4 GA=7.4-update2
Liferay 7.4 GA=7.4-update3
Liferay 7.4 GA=7.4-update4
Liferay 7.4 GA=7.4-update5
Liferay 7.4 GA=7.4-update6
Liferay 7.4 GA=7.4-update7
Liferay 7.4 GA=7.4-update8
Liferay 7.4 GA<7.4.3.13

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-25610?

    CVE-2024-25610 has a high severity level due to potential cross-site scripting vulnerabilities in Liferay Portal.

  • How do I fix CVE-2024-25610?

    To fix CVE-2024-25610, upgrade to the latest recommended versions of Liferay Portal or Liferay DXP listed in the vulnerability report.

  • Which versions of Liferay are affected by CVE-2024-25610?

    CVE-2024-25610 affects Liferay Portal versions 7.2.0 through 7.4.3.12 and older unsupported versions, as well as specific versions of Liferay DXP.

  • Can remote authenticated users exploit CVE-2024-25610?

    Yes, CVE-2024-25610 allows remote authenticated users to inject JavaScript into blog entries due to insufficient sanitization.

  • Are older versions of Liferay affected by CVE-2024-25610?

    Yes, older unsupported versions of Liferay Portal and Liferay DXP prior to the specified fixed versions are also affected by CVE-2024-25610.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203