CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allow users to upload an unlimited amount of files through the object entries attachment fields, the files are stored in the document_library allowing an attacker to cause a potential DDoS.
AI Analysis
Technical Summary
CVE-2025-43752 is a medium severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various 2024 and 2025 quarterly releases. The vulnerability is classified under CWE-770, which involves the allocation of resources without proper limits or throttling. In this case, the issue arises from the object entries attachment fields in Liferay Portal, which allow users to upload an unlimited number of files. These files are stored in the document_library component of the system. Because there is no restriction on the quantity or size of files uploaded, an attacker can exploit this flaw to consume excessive storage and processing resources, potentially leading to a denial-of-service (DoS) condition or distributed denial-of-service (DDoS) if exploited at scale. The vulnerability does not require authentication but does require user interaction (uploading files). The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects availability and integrity, as resource exhaustion can degrade or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because Liferay Portal is widely used as an enterprise web platform for building portals, intranets, and websites, often handling critical business content and workflows.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of service disruption through resource exhaustion attacks. An attacker could upload large volumes of files to the portal, filling storage and potentially degrading system performance or causing outages. This could interrupt business operations, especially for organizations relying on Liferay for customer-facing portals, internal collaboration, or content management. The impact is particularly critical for sectors with high availability requirements such as finance, government, healthcare, and telecommunications. Additionally, the disruption could lead to reputational damage and potential regulatory scrutiny under GDPR if service outages affect data availability or processing. Since no authentication is required, external attackers or malicious insiders could exploit this vulnerability with relative ease. The lack of throttling or limits on file uploads increases the risk of automated or scripted attacks causing denial-of-service conditions.
Mitigation Recommendations
European organizations should implement immediate compensating controls to mitigate this vulnerability until an official patch is released. These include: 1) Configuring web application firewalls (WAFs) or reverse proxies to limit the number and size of file uploads per user or IP address, effectively throttling upload requests. 2) Implementing rate limiting and upload quotas at the application or infrastructure level to prevent excessive resource consumption. 3) Monitoring and alerting on unusual spikes in file upload activity or storage usage within the document_library repository. 4) Restricting upload permissions to trusted users only, if feasible, to reduce exposure. 5) Conducting regular audits of uploaded files to detect and remove excessive or malicious content. 6) Isolating the document_library storage on dedicated volumes with capacity alerts to prevent system-wide impact. 7) Keeping Liferay Portal instances updated and closely monitoring vendor advisories for patches addressing this vulnerability. 8) Employing network segmentation to limit access to the portal from untrusted networks. These measures go beyond generic advice by focusing on practical controls tailored to the specific resource exhaustion vector of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
Description
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allow users to upload an unlimited amount of files through the object entries attachment fields, the files are stored in the document_library allowing an attacker to cause a potential DDoS.
AI-Powered Analysis
Technical Analysis
CVE-2025-43752 is a medium severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.132 and various 2024 and 2025 quarterly releases. The vulnerability is classified under CWE-770, which involves the allocation of resources without proper limits or throttling. In this case, the issue arises from the object entries attachment fields in Liferay Portal, which allow users to upload an unlimited number of files. These files are stored in the document_library component of the system. Because there is no restriction on the quantity or size of files uploaded, an attacker can exploit this flaw to consume excessive storage and processing resources, potentially leading to a denial-of-service (DoS) condition or distributed denial-of-service (DDoS) if exploited at scale. The vulnerability does not require authentication but does require user interaction (uploading files). The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects availability and integrity, as resource exhaustion can degrade or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because Liferay Portal is widely used as an enterprise web platform for building portals, intranets, and websites, often handling critical business content and workflows.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of service disruption through resource exhaustion attacks. An attacker could upload large volumes of files to the portal, filling storage and potentially degrading system performance or causing outages. This could interrupt business operations, especially for organizations relying on Liferay for customer-facing portals, internal collaboration, or content management. The impact is particularly critical for sectors with high availability requirements such as finance, government, healthcare, and telecommunications. Additionally, the disruption could lead to reputational damage and potential regulatory scrutiny under GDPR if service outages affect data availability or processing. Since no authentication is required, external attackers or malicious insiders could exploit this vulnerability with relative ease. The lack of throttling or limits on file uploads increases the risk of automated or scripted attacks causing denial-of-service conditions.
Mitigation Recommendations
European organizations should implement immediate compensating controls to mitigate this vulnerability until an official patch is released. These include: 1) Configuring web application firewalls (WAFs) or reverse proxies to limit the number and size of file uploads per user or IP address, effectively throttling upload requests. 2) Implementing rate limiting and upload quotas at the application or infrastructure level to prevent excessive resource consumption. 3) Monitoring and alerting on unusual spikes in file upload activity or storage usage within the document_library repository. 4) Restricting upload permissions to trusted users only, if feasible, to reduce exposure. 5) Conducting regular audits of uploaded files to detect and remove excessive or malicious content. 6) Isolating the document_library storage on dedicated volumes with capacity alerts to prevent system-wide impact. 7) Keeping Liferay Portal instances updated and closely monitoring vendor advisories for patches addressing this vulnerability. 8) Employing network segmentation to limit access to the portal from untrusted networks. These measures go beyond generic advice by focusing on practical controls tailored to the specific resource exhaustion vector of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-17T10:55:24.865Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a7bab8ad5a09ad0019f01f
Added to database: 8/22/2025, 12:32:56 AM
Last enriched: 8/29/2025, 1:12:26 AM
Last updated: 10/7/2025, 1:48:22 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.