Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal

0
Medium
VulnerabilityCVE-2025-43752cvecve-2025-43752cwe-770
Published: Fri Aug 22 2025 (08/22/2025, 00:00:45 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allow users to upload an unlimited amount of files through the object entries attachment fields, the files are stored in the document_library allowing an attacker to cause a potential DDoS.

AI-Powered Analysis

AILast updated: 08/29/2025, 01:12:26 UTC

Technical Analysis

CVE-2025-43752 is a medium severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various 2024 and 2025 quarterly releases. The vulnerability is classified under CWE-770, which involves the allocation of resources without proper limits or throttling. In this case, the issue arises from the object entries attachment fields in Liferay Portal, which allow users to upload an unlimited number of files. These files are stored in the document_library component of the system. Because there is no restriction on the quantity or size of files uploaded, an attacker can exploit this flaw to consume excessive storage and processing resources, potentially leading to a denial-of-service (DoS) condition or distributed denial-of-service (DDoS) if exploited at scale. The vulnerability does not require authentication but does require user interaction (uploading files). The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects availability and integrity, as resource exhaustion can degrade or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because Liferay Portal is widely used as an enterprise web platform for building portals, intranets, and websites, often handling critical business content and workflows.

Potential Impact

For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of service disruption through resource exhaustion attacks. An attacker could upload large volumes of files to the portal, filling storage and potentially degrading system performance or causing outages. This could interrupt business operations, especially for organizations relying on Liferay for customer-facing portals, internal collaboration, or content management. The impact is particularly critical for sectors with high availability requirements such as finance, government, healthcare, and telecommunications. Additionally, the disruption could lead to reputational damage and potential regulatory scrutiny under GDPR if service outages affect data availability or processing. Since no authentication is required, external attackers or malicious insiders could exploit this vulnerability with relative ease. The lack of throttling or limits on file uploads increases the risk of automated or scripted attacks causing denial-of-service conditions.

Mitigation Recommendations

European organizations should implement immediate compensating controls to mitigate this vulnerability until an official patch is released. These include: 1) Configuring web application firewalls (WAFs) or reverse proxies to limit the number and size of file uploads per user or IP address, effectively throttling upload requests. 2) Implementing rate limiting and upload quotas at the application or infrastructure level to prevent excessive resource consumption. 3) Monitoring and alerting on unusual spikes in file upload activity or storage usage within the document_library repository. 4) Restricting upload permissions to trusted users only, if feasible, to reduce exposure. 5) Conducting regular audits of uploaded files to detect and remove excessive or malicious content. 6) Isolating the document_library storage on dedicated volumes with capacity alerts to prevent system-wide impact. 7) Keeping Liferay Portal instances updated and closely monitoring vendor advisories for patches addressing this vulnerability. 8) Employing network segmentation to limit access to the portal from untrusted networks. These measures go beyond generic advice by focusing on practical controls tailored to the specific resource exhaustion vector of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:24.865Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a7bab8ad5a09ad0019f01f

Added to database: 8/22/2025, 12:32:56 AM

Last enriched: 8/29/2025, 1:12:26 AM

Last updated: 10/7/2025, 1:48:22 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats