Legacy Knowledge Base
Published Jul. 2, 2025

Can we prevent editors from injecting executable code in Web Content fields?

Written By

Daniel Couso

How To articles are not official guidelines or officially supported documentation. They are community-contributed content and may not always reflect the latest updates to Liferay DXP. We welcome your feedback to improve How To articles!

While we make every effort to ensure this Knowledge Base is accurate, it may not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with any feedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack" publication program, made available for informational purposes. Articles in this program were published without a requirement for independent editing or verification and are provided"as is" without guarantee.

Before using any information from this article, independently verify its suitability for your situation and project.

Issue

  • When rendering the text fields stored for a Web Content through Web Content Templates, the resulting markup might execute undesired code if the editor has introduced executable code like:
    • <img src=x onerror=alert("Hello")>

Environment

  • Liferay DXP 7.0+

Resolution

  • This can easily be prevented by using the utility class $htmlUtil.
  • $htmlUtil contains methods like $htmlUtil.escape(), which let the text saved be escaped.

Additional Information

Did this article resolve your issue ?

Legacy Knowledge Base