Legacy Knowledge Base
Published Jul. 2, 2025

Cross Site Scripting Vulnerability report on refererPlid or other parameters

Written By

Justin Mann

How To articles are not official guidelines or officially supported documentation. They are community-contributed content and may not always reflect the latest updates to Liferay DXP. We welcome your feedback to improve How To articles!

While we make every effort to ensure this Knowledge Base is accurate, it may not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with any feedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack" publication program, made available for informational purposes. Articles in this program were published without a requirement for independent editing or verification and are provided"as is" without guarantee.

Before using any information from this article, independently verify its suitability for your situation and project.

Issue

During a penetration test, a Cross Site Scripting Vulnerability may be reported, indicating that you can inject a script into the refererPlid parameter or into the _com_liferay_login_web_portlet_LoginPortlet_mvcRenderCommandName parameter.

 

Environment

  • Liferay DXP 7.3

 

Resolution

  • For both of the parameters mentioned, neither are rendered anywhere in the HTML and when a script is injected into the URL, it does not actually get executed.
  • Since no script gets executed or run when injected into the URL with those parameters, this vulnerability can be deemed as a false positive.
  • If this issue continues to be flagged in subsequent reports, the specific vulnerability check may need to be updated accordingly.
Did this article resolve your issue ?

Legacy Knowledge Base