Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38002: CWE-862 Missing Authorization in Liferay Portal

0
Critical
VulnerabilityCVE-2024-38002cvecve-2024-38002cwe-862
Published: Tue Oct 22 2024 (10/22/2024, 15:12:42 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API.

AI-Powered Analysis

AILast updated: 10/13/2025, 19:49:51 UTC

Technical Analysis

CVE-2024-38002 is a critical security vulnerability identified in the workflow component of Liferay Portal versions 7.3.2 through 7.4.3.111 and multiple Liferay DXP releases from 2023.Q3.1 through 2023.Q4.5. The root cause is a missing authorization check (CWE-862) before updating workflow definitions via the headless API. This flaw allows remote authenticated users with limited privileges to modify workflow definitions improperly. Because workflows can include executable logic, attackers can leverage this to execute arbitrary code on the server, leading to a full compromise of the affected system. The vulnerability is remotely exploitable over the network with low attack complexity but requires the attacker to be authenticated and perform some user interaction. The scope of impact is significant as it affects confidentiality, integrity, and availability (CIA triad) of the system. The vulnerability has been assigned a CVSS v3.1 score of 9.0, indicating critical severity. No public exploits have been reported yet, but the vulnerability's nature and impact make it a high-priority issue for organizations using Liferay Portal and DXP products. The flaw affects multiple versions spanning several major releases, indicating a long-standing issue that may require coordinated patching efforts.

Potential Impact

For European organizations, the impact of CVE-2024-38002 can be severe. Liferay Portal and DXP are widely used in enterprise content management, intranet portals, and workflow automation across various sectors including government, finance, healthcare, and education. Successful exploitation can lead to unauthorized modification of business-critical workflows, data breaches, and full system compromise through remote code execution. This could disrupt business operations, lead to data loss or theft, and damage organizational reputation. The ability to execute arbitrary code remotely elevates the risk of ransomware deployment or lateral movement within networks. Given the criticality and the broad range of affected versions, organizations running unpatched Liferay instances face a high risk of targeted attacks. The requirement for authentication limits exposure to some extent but does not eliminate risk, especially in environments with weak credential management or insider threats.

Mitigation Recommendations

1. Apply official patches from Liferay as soon as they are released to address this vulnerability. Monitor Liferay’s security advisories closely. 2. Restrict access to the headless API endpoints by implementing strict network segmentation and access controls, limiting usage to trusted users and systems only. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 4. Audit and monitor workflow definition changes continuously to detect unauthorized modifications promptly. 5. Implement least privilege principles for user roles interacting with workflow components to minimize potential abuse. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API calls targeting workflow updates. 7. Conduct regular security assessments and penetration testing focused on Liferay deployments to identify and remediate related weaknesses. 8. Educate administrators and developers about secure workflow management practices and the risks of improper authorization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2024-06-11T15:40:10.985Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed57c406a2a330d326046f

Added to database: 10/13/2025, 7:49:24 PM

Last enriched: 10/13/2025, 7:49:51 PM

Last updated: 10/13/2025, 10:09:56 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats