{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T13:25:50.009","vulnerabilities":[{"cve":{"id":"CVE-2023-42629","sourceIdentifier":"security@liferay.com","published":"2023-10-17T09:15:10.167","lastModified":"2024-11-21T08:22:50.527","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary's 'description' text field."},{"lang":"es","value":"Vulnerabilidad de Cross-Site Scripting (XSS) en la página de gestión de vocabulario en Liferay Portal v7.4.2 hasta v7.4.3.87, y Liferay DXP v7.4 anterior a la actualización 88 permite a atacantes remotos inyectar script web o HTML arbitrario a través de un payload manipulado inyectado en un vocabulario campo de texto 'description'."}],"metrics":{"cvssMetricV31":[{"source":"security@liferay.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security@liferay.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*","matchCriteriaId":"96E84DBC-C740-4E23-8D1D-83C8AE49813E"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*","matchCriteriaId":"8B1B2384-764F-43CC-8206-36DCBE9DDCBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*","matchCriteriaId":"22B6B8C1-1FF3-41BC-9576-16193AE20CC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*","matchCriteriaId":"9D07DB20-9DCF-4C05-99D2-F6B37A082C14"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*","matchCriteriaId":"1AB71307-7EAA-436A-9CBC-5A94F034FB48"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*","matchCriteriaId":"2B256485-E289-4092-B45B-835DE12625B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*","matchCriteriaId":"67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*","matchCriteriaId":"CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*","matchCriteriaId":"DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*","matchCriteriaId":"365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*","matchCriteriaId":"960F3F22-9CC8-4655-9B09-777E5A5A1239"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*","matchCriteriaId":"7E325115-EEBC-41F4-8606-45270DA40B98"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*","matchCriteriaId":"294D8A56-A797-433C-A06E-106B2179151A"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*","matchCriteriaId":"824D88D9-4645-4CAD-8CAB-30F27DD388C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*","matchCriteriaId":"F6E8C952-B455-46E4-AC3D-D38CAF189F60"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*","matchCriteriaId":"CD77C0EE-AC79-4443-A502-C1E02F806911"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*","matchCriteriaId":"648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*","matchCriteriaId":"39835EF7-8E93-4695-973D-6E9B76C67372"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.2","versionEndExcluding":"7.4.3.88","matchCriteriaId":"2AD42484-BDB9-4ECE-B003-259B35FB0DE6"}]}]}],"references":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629","source":"security@liferay.com","tags":["Vendor Advisory"]},{"url":"https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/","source":"security@liferay.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}