Legacy Knowledge Base
Published Jun. 30, 2025

Does having a script in a button fragment qualify as a potential XSS vulnerability?

Written By

István Gergely-Tárnoki

How To articles are not official guidelines or officially supported documentation. They are community-contributed content and may not always reflect the latest updates to Liferay DXP. We welcome your feedback to improve How To articles!

While we make every effort to ensure this Knowledge Base is accurate, it may not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with any feedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack" publication program, made available for informational purposes. Articles in this program were published without a requirement for independent editing or verification and are provided"as is" without guarantee.

Before using any information from this article, independently verify its suitability for your situation and project.

Issue

  • We can put a Javascript code in the Button fragment's URL field, so it can be executed when we click on the button, like javascript:alert(document.cookie)
  • Can that be a vulnerability to Cross Site Scripting (XSS)?

Environment

  • Liferay DXP 7.3+

Resolution

  • We allow adding scripts to the button fragment, so the admin (or editors) handling the URL can use that button to trigger Javascript.
  • Fragments on pages must have access to the available HTML features that build up the page, like in this case, where an <a> tag can include javascript in its href attribute.
Did this article resolve your issue ?

Legacy Knowledge Base