{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T21:10:19.483","vulnerabilities":[{"cve":{"id":"CVE-2025-2536","sourceIdentifier":"security@liferay.com","published":"2025-03-19T19:15:50.560","lastModified":"2025-12-16T18:43:10.740","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability on Liferay Portal 7.4.3.82 through 7.4.3.128, and Liferay DXP 2024.Q3.0, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 82 through update 92 in the Frontend JS module's layout-taglib/__liferay__/index.js allows remote attackers to inject arbitrary web script or HTML via toastData parameter"},{"lang":"es","value":"Vulnerabilidad de cross-site scripting (XSS) en Liferay Portal 7.4.3.82 a 7.4.3.128, y Liferay DXP 2024.Q3.0, 2024.Q2.0 a 2024.Q2.13, 2024.Q1.1 a 2024.Q1.12, 2023.Q4.0 a 2023.Q4.10, 2023.Q3.1 a 2023.Q3.10, 7.4 actualización 82 a 92 en layout-taglib/__liferay__/index.js del módulo Frontend JS permite a atacantes remotos inyectar script web o HTML arbitrarios mediante el parámetro toastData."}],"metrics":{"cvssMetricV40":[{"source":"security@liferay.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security@liferay.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"2023.Q3.1","versionEndIncluding":"2023.Q3.10","matchCriteriaId":"DB698493-4763-4E87-9764-BC36906CCF5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"2023.q4.0","versionEndIncluding":"2023.q4.10","matchCriteriaId":"99FC3415-FBE2-43BC-944A-72C0885453D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"2024.q1.1","versionEndIncluding":"2024.q1.12","matchCriteriaId":"6B17B47B-98AF-4CE9-8A90-AB9FF2F44ED5"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"2024.q2.0","versionEndIncluding":"2024.q2.13","matchCriteriaId":"0EB4ABE4-0B4D-471C-A868-0CA6F5EE7A47"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*","matchCriteriaId":"824D88D9-4645-4CAD-8CAB-30F27DD388C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*","matchCriteriaId":"F6E8C952-B455-46E4-AC3D-D38CAF189F60"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*","matchCriteriaId":"CD77C0EE-AC79-4443-A502-C1E02F806911"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*","matchCriteriaId":"648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*","matchCriteriaId":"39835EF7-8E93-4695-973D-6E9B76C67372"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*","matchCriteriaId":"2A05FB86-332B-44E3-93CB-82465A38976E"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*","matchCriteriaId":"7C754823-899C-4EEF-ACB7-E1551FA88B25"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*","matchCriteriaId":"493D4C18-DEE2-4040-9C13-3A9AB2CE47BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*","matchCriteriaId":"8F17DD75-E63B-4E4C-B136-D43F17B389EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*","matchCriteriaId":"62EE759A-78AD-40D6-8C5B-10403A8A4A89"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*","matchCriteriaId":"865ABA1F-CA99-4602-B325-F81C9778855C"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:2024.q3.0:*:*:*:*:*:*:*","matchCriteriaId":"2F34B4FB-DE32-4014-B938-1714D3204C95"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.3.82","versionEndIncluding":"7.4.3.128","matchCriteriaId":"64A9D91F-3D26-4E15-AC31-67EA247BBD16"}]}]}],"references":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-2536","source":"security@liferay.com","tags":["Vendor Advisory"]}]}}]}