Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43748: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal

0
High
VulnerabilityCVE-2025-43748cvecve-2025-43748cwe-352
Published: Wed Aug 20 2025 (08/20/2025, 14:28:21 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Insufficient CSRF protection for omni-administrator users in Liferay Portal 7.0.0 through 7.4.3.119, and Liferay DXP 2024.Q1.1 through 2024.Q1.6, 2023.Q4.0 through 2023.Q4.9, 2023.Q3.1 through 2023.Q3.9, 7.4 GA through update 92, 7.3 GA through update 36, and older unsupported versions allows attackers to execute Cross-Site Request Forgery

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:25:03 UTC

Technical Analysis

CVE-2025-43748 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Liferay Portal versions 7.0.0 through 7.4.3.119 and multiple Liferay DXP quarterly releases from 2023.Q3.1 through 2024.Q1.6, including older unsupported versions. The vulnerability arises due to insufficient CSRF protections specifically for omni-administrator users, who possess elevated privileges within the platform. CSRF attacks exploit the trust a web application places in an authenticated user by tricking them into submitting unauthorized requests, potentially leading to unauthorized actions such as configuration changes, data manipulation, or administrative control takeover. The CVSS 4.0 score of 7.1 reflects a high severity, with network attack vector, high attack complexity, partial privileges required, and user interaction necessary. The vulnerability impacts confidentiality, integrity, and availability, as attackers can leverage it to perform unauthorized administrative operations. Although no known exploits are currently reported in the wild, the broad range of affected versions and the critical nature of omni-administrator privileges make this a significant threat. The lack of available patches at the time of reporting necessitates immediate attention to alternative mitigations. Liferay Portal is widely used in enterprise and government environments for content management and digital experience delivery, increasing the potential impact of this vulnerability.

Potential Impact

The potential impact of CVE-2025-43748 is substantial for organizations using affected Liferay Portal and DXP versions. Successful exploitation could allow attackers to perform unauthorized administrative actions, leading to compromise of sensitive data, disruption of services, and unauthorized changes to web content or configurations. This could result in data breaches, defacement, service outages, and loss of trust. Given the omni-administrator role's extensive privileges, attackers could pivot to further internal systems or deploy persistent malicious configurations. The requirement for user interaction and partial privileges somewhat limits exploitation scope, but targeted phishing or social engineering campaigns could enable attackers to trick administrators into executing malicious requests. Organizations with public-facing Liferay portals are particularly at risk, as attackers can lure administrators into malicious sites. The absence of known exploits currently provides a window for proactive defense, but the widespread use of Liferay in critical sectors elevates the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2025-43748, organizations should first verify if their Liferay Portal or DXP installations fall within the affected versions and prioritize upgrading to patched versions once available. In the absence of patches, implement strict CSRF protections by enforcing anti-CSRF tokens on all state-changing requests, especially those accessible to omni-administrator users. Restrict administrative access to trusted networks and use VPNs or zero-trust network architectures to minimize exposure. Employ multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential misuse. Conduct regular security awareness training focused on phishing and social engineering to prevent user interaction exploitation. Monitor logs for unusual administrative activities and implement anomaly detection to identify potential CSRF attack attempts. Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious cross-site requests. Finally, isolate omni-administrator accounts and limit their use to essential tasks only, reducing the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:23.317Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a5e015ad5a09ad0005774f

Added to database: 8/20/2025, 2:47:49 PM

Last enriched: 2/27/2026, 2:25:03 AM

Last updated: 3/24/2026, 10:01:51 PM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses