Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3586: CWE-863 Incorrect Authorization in Liferay Portal

0
High
VulnerabilityCVE-2025-3586cvecve-2025-3586cwe-863
Published: Mon Sep 01 2025 (09/01/2025, 18:07:56 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

In Liferay Portal 7.4.3.27 through 7.4.3.42, and Liferay DXP 2024.Q1.1 through 2024.Q1.20, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 27 through update 42 (Liferay PaaS, and Liferay Self-Hosted), the Objects module does not restrict the use of Groovy scripts in Object actions for Admin Users. This allows remote authenticated admin users with the Instance Administrator role to execute arbitrary Groovy scripts (i.e., remote code execution) through Object actions. In contrast, in Liferay DXP (Liferay SaaS), the use of Groovy in Object actions is not allowed due to the high security risks it poses. Starting from Liferay DXP 2024.Q2 and later, a new feature has been introduced in Instance Settings that allows administrators to configure whether Groovy scripts are allowed in their instances.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:54:38 UTC

Technical Analysis

CVE-2025-3586 is a high-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.3.27 through 7.4.3.42, and various 2023 and 2024 quarterly releases of Liferay DXP (including both PaaS and self-hosted deployments). The vulnerability arises from improper authorization controls (CWE-863) in the Objects module, which fails to restrict the execution of Groovy scripts within Object actions for users holding the Instance Administrator role. This flaw enables remote authenticated administrators to execute arbitrary Groovy scripts, effectively allowing remote code execution (RCE) on the affected system. Notably, this risk is mitigated in Liferay DXP SaaS offerings where Groovy script execution in Object actions is disabled by default. Starting with Liferay DXP 2024.Q2 and later, administrators gain the ability to configure the allowance of Groovy scripts via Instance Settings, providing a security control to reduce exposure. The CVSS 4.0 base score of 7.5 reflects a high severity, with network attack vector, high attack complexity, no user interaction required, and privileges required at the administrator level. The vulnerability does not appear to have known exploits in the wild yet, but its potential impact is significant due to the possibility of arbitrary code execution by privileged users.

Potential Impact

For European organizations using affected versions of Liferay Portal or Liferay DXP, this vulnerability poses a serious risk to system confidentiality, integrity, and availability. Since the flaw requires an authenticated user with Instance Administrator privileges, the threat is primarily from insider threats or compromised administrator accounts. Successful exploitation could lead to full system compromise, data breaches, unauthorized data manipulation, and disruption of critical business services hosted on Liferay platforms. Given Liferay's popularity in enterprise content management and portal solutions across Europe, especially in sectors like government, finance, and telecommunications, exploitation could result in significant operational and reputational damage. Additionally, the ability to execute arbitrary Groovy scripts could facilitate lateral movement within networks and deployment of further malware or ransomware, amplifying the threat impact. The lack of user interaction and network-based attack vector increases the risk of automated or remote exploitation once credentials are obtained.

Mitigation Recommendations

European organizations should immediately assess their Liferay Portal and DXP deployments to identify affected versions. Specific mitigation steps include: 1) Upgrading to Liferay DXP 2024.Q2 or later where administrators can disable Groovy script execution in Object actions via Instance Settings, effectively eliminating this attack vector. 2) If upgrading is not immediately feasible, restrict Instance Administrator privileges strictly to trusted personnel and enforce strong multi-factor authentication (MFA) to reduce risk of credential compromise. 3) Conduct thorough audits of existing Object actions to identify and remove any unauthorized or risky Groovy scripts. 4) Monitor logs and system behavior for unusual script execution or administrative activity indicative of exploitation attempts. 5) Implement network segmentation and least privilege principles to limit the impact of any potential compromise. 6) Engage with Liferay support or security advisories for any available patches or hotfixes, and apply them promptly once released. 7) Educate administrators on the risks of Groovy script usage and enforce policies to govern their use.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-14T12:30:41.451Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b5e345ad5a09ad00d1e197

Added to database: 9/1/2025, 6:17:41 PM

Last enriched: 9/9/2025, 9:54:38 PM

Last updated: 10/20/2025, 12:30:45 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats