Description
Liferay CMS Portal version 7.1.3 and 7.2.1 have a blind persistent cross-site scripting (XSS) vulnerability in the user name parameter to Calendar. An attacker can insert the malicious payload on the username, lastname or surname fields of its own profile, and the malicious payload will be injected and reflected in the calendar of the user who submitted the payload. An attacker could escalate its privileges in case an admin visits the calendar that injected the payload.
Published: 2021-01-07
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-18162 Liferay Portal Vulnerable to Cross-Site Scripting (XSS) via User Name Parameter
Github GHSA Github GHSA GHSA-pvpg-9553-f979 Liferay Portal Vulnerable to Cross-Site Scripting (XSS) via User Name Parameter
History

No history.

Subscriptions

Liferay Liferay Portal
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:33:05.672Z

Reserved: 2020-09-14T00:00:00.000Z

Link: CVE-2020-25476

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-07T17:15:12.590

Modified: 2024-11-21T05:18:02.020

Link: CVE-2020-25476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses