CVE-2025-3586: CWE-863 Incorrect Authorization in Liferay Portal
In Liferay Portal 7.4.3.27 through 7.4.3.42, and Liferay DXP 2024.Q1.1 through 2024.Q1.20, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 27 through update 42 (Liferay PaaS, and Liferay Self-Hosted), the Objects module does not restrict the use of Groovy scripts in Object actions for Admin Users. This allows remote authenticated admin users with the Instance Administrator role to execute arbitrary Groovy scripts (i.e., remote code execution) through Object actions. In contrast, in Liferay DXP (Liferay SaaS), the use of Groovy in Object actions is not allowed due to the high security risks it poses. Starting from Liferay DXP 2024.Q2 and later, a new feature has been introduced in Instance Settings that allows administrators to configure whether Groovy scripts are allowed in their instances.
AI Analysis
Technical Summary
CVE-2025-3586 is a high-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.3.27 through 7.4.3.42, and various 2023 and 2024 quarterly releases of Liferay DXP (including both PaaS and self-hosted deployments). The vulnerability arises from improper authorization controls (CWE-863) in the Objects module, which fails to restrict the execution of Groovy scripts within Object actions for users holding the Instance Administrator role. This flaw enables remote authenticated administrators to execute arbitrary Groovy scripts, effectively allowing remote code execution (RCE) on the affected system. Notably, this risk is mitigated in Liferay DXP SaaS offerings where Groovy script execution in Object actions is disabled by default. Starting with Liferay DXP 2024.Q2 and later, administrators gain the ability to configure the allowance of Groovy scripts via Instance Settings, providing a security control to reduce exposure. The CVSS 4.0 base score of 7.5 reflects a high severity, with network attack vector, high attack complexity, no user interaction required, and privileges required at the administrator level. The vulnerability does not appear to have known exploits in the wild yet, but its potential impact is significant due to the possibility of arbitrary code execution by privileged users.
Potential Impact
For European organizations using affected versions of Liferay Portal or Liferay DXP, this vulnerability poses a serious risk to system confidentiality, integrity, and availability. Since the flaw requires an authenticated user with Instance Administrator privileges, the threat is primarily from insider threats or compromised administrator accounts. Successful exploitation could lead to full system compromise, data breaches, unauthorized data manipulation, and disruption of critical business services hosted on Liferay platforms. Given Liferay's popularity in enterprise content management and portal solutions across Europe, especially in sectors like government, finance, and telecommunications, exploitation could result in significant operational and reputational damage. Additionally, the ability to execute arbitrary Groovy scripts could facilitate lateral movement within networks and deployment of further malware or ransomware, amplifying the threat impact. The lack of user interaction and network-based attack vector increases the risk of automated or remote exploitation once credentials are obtained.
Mitigation Recommendations
European organizations should immediately assess their Liferay Portal and DXP deployments to identify affected versions. Specific mitigation steps include: 1) Upgrading to Liferay DXP 2024.Q2 or later where administrators can disable Groovy script execution in Object actions via Instance Settings, effectively eliminating this attack vector. 2) If upgrading is not immediately feasible, restrict Instance Administrator privileges strictly to trusted personnel and enforce strong multi-factor authentication (MFA) to reduce risk of credential compromise. 3) Conduct thorough audits of existing Object actions to identify and remove any unauthorized or risky Groovy scripts. 4) Monitor logs and system behavior for unusual script execution or administrative activity indicative of exploitation attempts. 5) Implement network segmentation and least privilege principles to limit the impact of any potential compromise. 6) Engage with Liferay support or security advisories for any available patches or hotfixes, and apply them promptly once released. 7) Educate administrators on the risks of Groovy script usage and enforce policies to govern their use.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-3586: CWE-863 Incorrect Authorization in Liferay Portal
Description
In Liferay Portal 7.4.3.27 through 7.4.3.42, and Liferay DXP 2024.Q1.1 through 2024.Q1.20, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 27 through update 42 (Liferay PaaS, and Liferay Self-Hosted), the Objects module does not restrict the use of Groovy scripts in Object actions for Admin Users. This allows remote authenticated admin users with the Instance Administrator role to execute arbitrary Groovy scripts (i.e., remote code execution) through Object actions. In contrast, in Liferay DXP (Liferay SaaS), the use of Groovy in Object actions is not allowed due to the high security risks it poses. Starting from Liferay DXP 2024.Q2 and later, a new feature has been introduced in Instance Settings that allows administrators to configure whether Groovy scripts are allowed in their instances.
AI-Powered Analysis
Technical Analysis
CVE-2025-3586 is a high-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.3.27 through 7.4.3.42, and various 2023 and 2024 quarterly releases of Liferay DXP (including both PaaS and self-hosted deployments). The vulnerability arises from improper authorization controls (CWE-863) in the Objects module, which fails to restrict the execution of Groovy scripts within Object actions for users holding the Instance Administrator role. This flaw enables remote authenticated administrators to execute arbitrary Groovy scripts, effectively allowing remote code execution (RCE) on the affected system. Notably, this risk is mitigated in Liferay DXP SaaS offerings where Groovy script execution in Object actions is disabled by default. Starting with Liferay DXP 2024.Q2 and later, administrators gain the ability to configure the allowance of Groovy scripts via Instance Settings, providing a security control to reduce exposure. The CVSS 4.0 base score of 7.5 reflects a high severity, with network attack vector, high attack complexity, no user interaction required, and privileges required at the administrator level. The vulnerability does not appear to have known exploits in the wild yet, but its potential impact is significant due to the possibility of arbitrary code execution by privileged users.
Potential Impact
For European organizations using affected versions of Liferay Portal or Liferay DXP, this vulnerability poses a serious risk to system confidentiality, integrity, and availability. Since the flaw requires an authenticated user with Instance Administrator privileges, the threat is primarily from insider threats or compromised administrator accounts. Successful exploitation could lead to full system compromise, data breaches, unauthorized data manipulation, and disruption of critical business services hosted on Liferay platforms. Given Liferay's popularity in enterprise content management and portal solutions across Europe, especially in sectors like government, finance, and telecommunications, exploitation could result in significant operational and reputational damage. Additionally, the ability to execute arbitrary Groovy scripts could facilitate lateral movement within networks and deployment of further malware or ransomware, amplifying the threat impact. The lack of user interaction and network-based attack vector increases the risk of automated or remote exploitation once credentials are obtained.
Mitigation Recommendations
European organizations should immediately assess their Liferay Portal and DXP deployments to identify affected versions. Specific mitigation steps include: 1) Upgrading to Liferay DXP 2024.Q2 or later where administrators can disable Groovy script execution in Object actions via Instance Settings, effectively eliminating this attack vector. 2) If upgrading is not immediately feasible, restrict Instance Administrator privileges strictly to trusted personnel and enforce strong multi-factor authentication (MFA) to reduce risk of credential compromise. 3) Conduct thorough audits of existing Object actions to identify and remove any unauthorized or risky Groovy scripts. 4) Monitor logs and system behavior for unusual script execution or administrative activity indicative of exploitation attempts. 5) Implement network segmentation and least privilege principles to limit the impact of any potential compromise. 6) Engage with Liferay support or security advisories for any available patches or hotfixes, and apply them promptly once released. 7) Educate administrators on the risks of Groovy script usage and enforce policies to govern their use.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-14T12:30:41.451Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b5e345ad5a09ad00d1e197
Added to database: 9/1/2025, 6:17:41 PM
Last enriched: 9/9/2025, 9:54:38 PM
Last updated: 10/20/2025, 12:30:45 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8349: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Tawk Live Chat
MediumCVE-2025-41028: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Grupo Castilla Epsilon RH
CriticalCVE-2025-57837: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor FCP-AN10
LowCVE-2025-31342: CWE-434 Unrestricted Upload of File with Dangerous Type in Galaxy Software Services Corporation Vitals ESP
CriticalCVE-2025-57839: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor MagicOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.