
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross-site scripting (XSS) vulnerability in the Journal module's add article menu in Liferay Portal 7.3.0 through 7.3.3, and Liferay DXP 7.1 fix pack 18, and 7.2 fix pack 5 through 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_journal_web_portlet_JournalPortlet_name parameter (NVD, Liferay Portal).
The vulnerability exists in the journal module where the _com_liferay_journal_web_portlet_JournalPortlet_name parameter is not properly sanitized, allowing for injection of malicious web script or HTML. This is classified as a stored XSS vulnerability, which means the malicious script is permanently stored on the target servers (Liferay Portal).
The vulnerability allows remote attackers to inject and execute arbitrary web script or HTML in the context of other users' browsers who access the affected pages. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the affected users (NVD).
The vulnerability has been fixed in Liferay Portal version 7.3.4. Users of affected versions should upgrade to this version or later to mitigate the vulnerability (Liferay Portal).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."