CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allow users to upload an unlimited amount of files through the object entries attachment fields, the files are stored in the document_library allowing an attacker to cause a potential DDoS.
AI Analysis
Technical Summary
CVE-2025-43752 is a resource allocation vulnerability classified under CWE-770, affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various 2024 and 2025 quarterly releases. The vulnerability arises from the lack of limits or throttling on file uploads through object entries attachment fields. Attackers can exploit this by uploading an unlimited number of files, which are stored in the document_library component of the portal. This unchecked resource consumption can lead to denial of service (DoS) conditions by exhausting storage capacity or overwhelming system resources, effectively causing a potential distributed denial of service (DDoS) scenario. The vulnerability requires no authentication but does require user interaction (uploading files). The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability highlights a design flaw in resource management and input validation within Liferay Portal's file upload functionality, which could be leveraged to degrade service availability.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of service disruption through resource exhaustion. Organizations relying on Liferay for intranet portals, customer-facing websites, or document management may experience degraded performance or outages if attackers exploit this flaw to upload excessive files. This can impact business continuity, user experience, and potentially lead to reputational damage. Since Liferay is widely used in sectors such as government, education, and enterprise across Europe, the impact could be significant in environments where availability is critical. Additionally, the lack of authentication requirement lowers the barrier for exploitation, increasing risk exposure. However, the medium severity rating and absence of known exploits suggest the threat is moderate but warrants proactive mitigation to prevent potential denial of service attacks.
Mitigation Recommendations
European organizations should implement specific controls to mitigate this vulnerability beyond generic advice: 1) Enforce strict file upload limits at the application or web server level, such as maximum number of files, total upload size, and rate limiting per user or IP address. 2) Implement input validation and sanitization to restrict file types and sizes accepted by the object entries attachment fields. 3) Monitor document_library storage usage and set alerts for unusual spikes in file uploads or storage consumption. 4) Employ web application firewalls (WAFs) with custom rules to detect and block abnormal upload patterns targeting Liferay portals. 5) Isolate Liferay document storage on separate volumes with quotas to prevent system-wide resource exhaustion. 6) Regularly update Liferay Portal and DXP to the latest versions once patches addressing this vulnerability are released. 7) Educate users and administrators about the risk and encourage reporting of suspicious upload activity. These targeted measures will help reduce the attack surface and improve resilience against exploitation of this resource exhaustion vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
Description
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allow users to upload an unlimited amount of files through the object entries attachment fields, the files are stored in the document_library allowing an attacker to cause a potential DDoS.
AI-Powered Analysis
Technical Analysis
CVE-2025-43752 is a resource allocation vulnerability classified under CWE-770, affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various 2024 and 2025 quarterly releases. The vulnerability arises from the lack of limits or throttling on file uploads through object entries attachment fields. Attackers can exploit this by uploading an unlimited number of files, which are stored in the document_library component of the portal. This unchecked resource consumption can lead to denial of service (DoS) conditions by exhausting storage capacity or overwhelming system resources, effectively causing a potential distributed denial of service (DDoS) scenario. The vulnerability requires no authentication but does require user interaction (uploading files). The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability highlights a design flaw in resource management and input validation within Liferay Portal's file upload functionality, which could be leveraged to degrade service availability.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of service disruption through resource exhaustion. Organizations relying on Liferay for intranet portals, customer-facing websites, or document management may experience degraded performance or outages if attackers exploit this flaw to upload excessive files. This can impact business continuity, user experience, and potentially lead to reputational damage. Since Liferay is widely used in sectors such as government, education, and enterprise across Europe, the impact could be significant in environments where availability is critical. Additionally, the lack of authentication requirement lowers the barrier for exploitation, increasing risk exposure. However, the medium severity rating and absence of known exploits suggest the threat is moderate but warrants proactive mitigation to prevent potential denial of service attacks.
Mitigation Recommendations
European organizations should implement specific controls to mitigate this vulnerability beyond generic advice: 1) Enforce strict file upload limits at the application or web server level, such as maximum number of files, total upload size, and rate limiting per user or IP address. 2) Implement input validation and sanitization to restrict file types and sizes accepted by the object entries attachment fields. 3) Monitor document_library storage usage and set alerts for unusual spikes in file uploads or storage consumption. 4) Employ web application firewalls (WAFs) with custom rules to detect and block abnormal upload patterns targeting Liferay portals. 5) Isolate Liferay document storage on separate volumes with quotas to prevent system-wide resource exhaustion. 6) Regularly update Liferay Portal and DXP to the latest versions once patches addressing this vulnerability are released. 7) Educate users and administrators about the risk and encourage reporting of suspicious upload activity. These targeted measures will help reduce the attack surface and improve resilience against exploitation of this resource exhaustion vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-17T10:55:24.865Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a7bab8ad5a09ad0019f01f
Added to database: 8/22/2025, 12:32:56 AM
Last enriched: 8/22/2025, 12:35:09 AM
Last updated: 8/22/2025, 5:17:58 AM
Views: 5
Related Threats
CVE-2025-8281: CWE-79 Cross-Site Scripting (XSS) in WP Talroo
HighCVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumCVE-2025-41451: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Danfoss AK-SM8xxA Series
HighCVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.