{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T16:16:36.717","vulnerabilities":[{"cve":{"id":"CVE-2024-25145","sourceIdentifier":"security@liferay.com","published":"2024-02-07T15:15:09.097","lastModified":"2025-05-13T18:17:51.450","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stored cross-site scripting (XSS) vulnerability in the Portal Search module's Search Result app in Liferay Portal 7.2.0 through 7.4.3.11, and older unsupported versions, and Liferay DXP 7.4 before update 8, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML into the Search Result app's search result if highlighting is disabled by adding any searchable content (e.g., blog, message board message, web content article) to the application."},{"lang":"es","value":"Vulnerabilidad de cross-site scripting (XSS) almacenado en la aplicación Resultados de búsqueda del módulo Portal Search en Liferay Portal 7.2.0 a 7.4.3.11 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualización 8, 7.3 antes de la actualización 4, 7.2 antes del fixpack 17 y versiones anteriores no compatibles permiten a los usuarios autenticados remotamente inyectar scripts web o HTML arbitrario en el resultado de búsqueda de la aplicación Resultados de búsqueda si el resaltado está deshabilitado agregando cualquier contenido que permita realizar búsquedas (por ejemplo, blog, mensaje en el tablero de mensajes, artículo de contenido web) a la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"security@liferay.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security@liferay.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*","versionEndExcluding":"7.2","matchCriteriaId":"AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*","matchCriteriaId":"0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*","matchCriteriaId":"E7E68DF8-749B-4284-A7C9-929701A86B36"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*","matchCriteriaId":"340DF1FE-5720-4516-BA51-F2197A654409"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*","matchCriteriaId":"97E155DE-05C6-4559-94A8-0EFEB958D0C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*","matchCriteriaId":"0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*","matchCriteriaId":"77523B76-FC26-41B1-A804-7372E13F4FB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*","matchCriteriaId":"B15397B8-5087-4239-AE78-D3C37D59DE83"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*","matchCriteriaId":"311EE92A-0EEF-4556-A52F-E6C9522FA2DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*","matchCriteriaId":"7CECAA19-8B7F-44C8-8059-6D4F2105E196"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*","matchCriteriaId":"68CBCEEB-7C28-4769-813F-3F01E33D2E08"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*","matchCriteriaId":"C0CB4927-A361-4DFA-BDB8-A454EA2894AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*","matchCriteriaId":"B2B771B7-D5CB-4778-A3A8-1005E4EE134C"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*","matchCriteriaId":"3B9DB383-3791-4A43-BA4D-7695B203E736"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*","matchCriteriaId":"13F02D77-20E9-4F32-9752-511EB71E6704"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*","matchCriteriaId":"6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*","matchCriteriaId":"759DDB90-6A89-4E4F-BD04-F70EFA5343B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*","matchCriteriaId":"21C55D41-DB66-494D-BEEB-BDAC7CB4B31B"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:fix_pack_2:*:*:*:*:*:*","matchCriteriaId":"50EA838E-E234-4EE1-8193-5FAD0E093940"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:sp1:*:*:*:*:*:*","matchCriteriaId":"9D75A0FF-BAEA-471A-87B2-8EC2A9F0A6B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:sp2:*:*:*:*:*:*","matchCriteriaId":"D86CDCC0-9655-477B-83FA-ADDBB5AF43A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:sp3:*:*:*:*:*:*","matchCriteriaId":"1CF5B84B-1719-4581-8474-C55CEFFD8305"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:update_1:*:*:*:*:*:*","matchCriteriaId":"D60CDAA3-6029-4904-9D08-BB221BCFD7C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:update_2:*:*:*:*:*:*","matchCriteriaId":"B66F47E9-3D82-497E-BD84-E47A65FAF8C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.3:update_3:*:*:*:*:*:*","matchCriteriaId":"A0BA4856-59DF-427C-959F-3B836314F5D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:-:*:*:*:*:*:*","matchCriteriaId":"ADB5F13C-EE1E-4448-8FCF-5966F6874440"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_1:*:*:*:*:*:*","matchCriteriaId":"46AF397F-A95C-4FAD-A6EA-CB623B7A262A"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_2:*:*:*:*:*:*","matchCriteriaId":"C2C2351E-BDEE-4A79-A00C-6520B54996EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_3:*:*:*:*:*:*","matchCriteriaId":"25F5C3E9-CBB0-4114-91A4-41F0E666026A"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_4:*:*:*:*:*:*","matchCriteriaId":"5E2B5687-B311-460E-A562-D754AF271F8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_5:*:*:*:*:*:*","matchCriteriaId":"B49D0CB9-8ED7-46AB-9BA5-7235A2CD9117"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_6:*:*:*:*:*:*","matchCriteriaId":"DF169364-096C-4294-B89F-C07AF1DCC9C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:dxp:7.4:update_7:*:*:*:*:*:*","matchCriteriaId":"30CB2C54-1A20-4226-ACC6-AC8131899AE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionEndIncluding":"7.2.1","matchCriteriaId":"345F6776-E492-489C-AC23-760BBC693A4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.0","versionEndIncluding":"7.3.7","matchCriteriaId":"13F59EAA-9EC8-44CC-8F56-BC26981F584F"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.3.12","matchCriteriaId":"9DCE033F-5706-4060-8ED1-BB386019325D"}]}]}],"references":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25145","source":"security@liferay.com","tags":["Vendor Advisory"]},{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}