CVE-2025-43745: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal
A CSRF vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.7, 2025.Q1.0 through 2025.Q1.14, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows remote attackers to performs cross-origin request on behalf of the authenticated user via the endpoint parameter.
AI Analysis
Technical Summary
CVE-2025-43745 is a Cross-Site Request Forgery (CSRF) vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various quarterly releases from 2024.Q1 through 2025.Q2. The vulnerability allows a remote attacker to perform unauthorized cross-origin requests on behalf of an authenticated user by exploiting the endpoint parameter. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a request that performs an action without their consent, leveraging the user's active session. In this case, the vulnerability resides in the Liferay Portal's handling of requests, where insufficient validation or protection mechanisms allow malicious cross-origin requests to be accepted and executed. The CVSS v4.0 score is 6.9 (medium severity), indicating a moderate risk. The vector indicates that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), and no authentication (AT:N), but does require user interaction (UI:A). The vulnerability impacts confidentiality (VC:H) but not integrity or availability. No known exploits are currently reported in the wild. The lack of patch links suggests that either patches are pending or not publicly linked yet. Given Liferay Portal's role as a widely used enterprise web platform for content management and collaboration, this vulnerability could allow attackers to perform unauthorized actions such as changing user settings, submitting forms, or triggering administrative functions if the victim is logged in, potentially leading to data leakage or unauthorized changes.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a significant risk, especially for those relying on the affected versions in their intranet portals, customer-facing websites, or internal collaboration platforms. Successful exploitation could lead to unauthorized actions performed under the guise of legitimate users, potentially exposing sensitive corporate data or disrupting business processes. Since Liferay is popular among public sector, financial institutions, and large enterprises in Europe, the impact could include data confidentiality breaches and reputational damage. The vulnerability's requirement for user interaction means phishing or social engineering campaigns could be used to lure users into triggering malicious requests. This risk is heightened in sectors with high regulatory requirements such as GDPR compliance, where unauthorized data access or modification could lead to legal penalties. However, the absence of known active exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should prioritize updating Liferay Portal and Liferay DXP to the latest patched versions once available. Until patches are released, organizations should implement strict Content Security Policy (CSP) headers to restrict cross-origin requests and reduce the attack surface. Employing anti-CSRF tokens in all state-changing requests is critical to prevent unauthorized actions. Organizations should also conduct user awareness training to recognize phishing attempts that could trigger CSRF attacks. Network-level mitigations such as Web Application Firewalls (WAFs) can be configured to detect and block suspicious cross-origin requests targeting Liferay endpoints. Additionally, reviewing and minimizing the permissions of authenticated users can limit the potential damage from successful CSRF exploitation. Monitoring logs for unusual activity related to endpoint parameters and user actions can help detect attempted exploitation early. Finally, disabling or restricting unnecessary Liferay features that accept cross-origin requests can reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-43745: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal
Description
A CSRF vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.7, 2025.Q1.0 through 2025.Q1.14, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows remote attackers to performs cross-origin request on behalf of the authenticated user via the endpoint parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-43745 is a Cross-Site Request Forgery (CSRF) vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various quarterly releases from 2024.Q1 through 2025.Q2. The vulnerability allows a remote attacker to perform unauthorized cross-origin requests on behalf of an authenticated user by exploiting the endpoint parameter. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a request that performs an action without their consent, leveraging the user's active session. In this case, the vulnerability resides in the Liferay Portal's handling of requests, where insufficient validation or protection mechanisms allow malicious cross-origin requests to be accepted and executed. The CVSS v4.0 score is 6.9 (medium severity), indicating a moderate risk. The vector indicates that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), and no authentication (AT:N), but does require user interaction (UI:A). The vulnerability impacts confidentiality (VC:H) but not integrity or availability. No known exploits are currently reported in the wild. The lack of patch links suggests that either patches are pending or not publicly linked yet. Given Liferay Portal's role as a widely used enterprise web platform for content management and collaboration, this vulnerability could allow attackers to perform unauthorized actions such as changing user settings, submitting forms, or triggering administrative functions if the victim is logged in, potentially leading to data leakage or unauthorized changes.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a significant risk, especially for those relying on the affected versions in their intranet portals, customer-facing websites, or internal collaboration platforms. Successful exploitation could lead to unauthorized actions performed under the guise of legitimate users, potentially exposing sensitive corporate data or disrupting business processes. Since Liferay is popular among public sector, financial institutions, and large enterprises in Europe, the impact could include data confidentiality breaches and reputational damage. The vulnerability's requirement for user interaction means phishing or social engineering campaigns could be used to lure users into triggering malicious requests. This risk is heightened in sectors with high regulatory requirements such as GDPR compliance, where unauthorized data access or modification could lead to legal penalties. However, the absence of known active exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should prioritize updating Liferay Portal and Liferay DXP to the latest patched versions once available. Until patches are released, organizations should implement strict Content Security Policy (CSP) headers to restrict cross-origin requests and reduce the attack surface. Employing anti-CSRF tokens in all state-changing requests is critical to prevent unauthorized actions. Organizations should also conduct user awareness training to recognize phishing attempts that could trigger CSRF attacks. Network-level mitigations such as Web Application Firewalls (WAFs) can be configured to detect and block suspicious cross-origin requests targeting Liferay endpoints. Additionally, reviewing and minimizing the permissions of authenticated users can limit the potential damage from successful CSRF exploitation. Monitoring logs for unusual activity related to endpoint parameters and user actions can help detect attempted exploitation early. Finally, disabling or restricting unnecessary Liferay features that accept cross-origin requests can reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-17T10:55:23.316Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a4c6efad5a09ad00fa2970
Added to database: 8/19/2025, 6:48:15 PM
Last enriched: 8/19/2025, 7:03:38 PM
Last updated: 8/19/2025, 7:32:50 PM
Views: 2
Related Threats
CVE-2025-9165: Memory Leak in LibTIFF
MediumCVE-2025-9157: Use After Free in appneta tcpreplay
MediumCVE-2025-51529: n/a
MediumCVE-2025-50579: n/a
MediumCVE-2025-55740: CWE-1392: Use of Default Credentials in Anipaleja nginx-defender
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.