{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-4599","assignerOrgId":"8b54e794-c6f0-462e-9faa-c1001a673ac3","state":"PUBLISHED","assignerShortName":"Liferay","dateReserved":"2025-05-12T17:02:55.131Z","datePublished":"2025-08-04T21:18:14.251Z","dateUpdated":"2025-08-05T15:43:07.612Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Portal","vendor":"Liferay","versions":[{"lessThanOrEqual":"7.4.3.132","status":"affected","version":"7.4.0","versionType":"maven"}]},{"defaultStatus":"unaffected","product":"DXP","vendor":"Liferay","versions":[{"lessThanOrEqual":"7.4.13-u92","status":"affected","version":"7.4.13-u61","versionType":"maven"},{"lessThanOrEqual":"2024.Q1.13","status":"affected","version":"2024.Q1.1","versionType":"maven"},{"lessThanOrEqual":"2024.Q2.13","status":"affected","version":"2024.Q2.0","versionType":"maven"},{"lessThanOrEqual":"2024.Q3.13","status":"affected","version":"2024.Q3.0","versionType":"maven"},{"lessThanOrEqual":"2024.Q4.5","status":"affected","version":"2024.Q4.0","versionType":"maven"}]}],"credits":[{"lang":"en","type":"reporter","value":"Gareth Catterall, AnchorSec security team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The fragment preview functionality in Liferay Portal 7.4.3.61 through 7.4.3.132, and Liferay DXP 2024.Q4.1 through 2024.Q4.5, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.13 and 7.4 update 61 through update 92 was found to be vulnerable to postMessage-based XSS because it allows a remote non-authenticated attacker to inject JavaScript into the fragment portlet URL."}],"value":"The fragment preview functionality in Liferay Portal 7.4.3.61 through 7.4.3.132, and Liferay DXP 2024.Q4.1 through 2024.Q4.5, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.13 and 7.4 update 61 through update 92 was found to be vulnerable to postMessage-based XSS because it allows a remote non-authenticated attacker to inject JavaScript into the fragment portlet URL."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":2,"baseSeverity":"LOW","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8b54e794-c6f0-462e-9faa-c1001a673ac3","shortName":"Liferay","dateUpdated":"2025-08-04T21:18:14.251Z"},"references":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-4599"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-05T15:43:01.163376Z","id":"CVE-2025-4599","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-05T15:43:07.612Z"}}]}}