CVE-2025-43767: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
Open Redirect vulnerability in /c/portal/edit_info_item parameter redirect in Liferay Portal 7.4.3.86 through 7.4.3.131, and Liferay DXP 2024.Q3.1 through 2024.Q3.9, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12 and 7.4 update 86 through update 92 allows an attacker to exploit this security vulnerability to redirect users to a malicious site.
AI Analysis
Technical Summary
CVE-2025-43767 is an Open Redirect vulnerability (CWE-601) identified in multiple versions of the Liferay Portal product, specifically versions 7.4.3.86 through 7.4.3.131, and various releases of Liferay DXP 2024.Q1 through 2024.Q3, including updates 86 through 92 of version 7.4. The vulnerability exists in the /c/portal/edit_info_item endpoint, where the 'redirect' parameter can be manipulated by an attacker to redirect users to arbitrary, potentially malicious external websites. This flaw arises because the application fails to properly validate or restrict the URLs provided in the redirect parameter, allowing attackers to craft URLs that appear legitimate but redirect victims to phishing sites, malware distribution points, or other harmful destinations. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that the vulnerability is remotely exploitable without authentication, requires no privileges, but does require user interaction (clicking a crafted link). The impact on confidentiality and integrity is limited, but availability impact is negligible. No known exploits are currently reported in the wild, and no patches are linked in the provided data, indicating that remediation may still be pending or in progress. This vulnerability primarily facilitates social engineering attacks by leveraging user trust in the legitimate Liferay Portal domain to redirect users to malicious sites.
Potential Impact
For European organizations using Liferay Portal, this vulnerability poses a significant risk primarily in the form of phishing and social engineering attacks. Attackers can exploit the open redirect to craft URLs that appear to originate from a trusted corporate portal, increasing the likelihood that users will follow malicious links. This can lead to credential theft, malware infections, or unauthorized access to sensitive information if users are redirected to fake login pages or exploit sites. The impact is particularly concerning for sectors with high reliance on Liferay Portal for internal or customer-facing services, such as government agencies, financial institutions, and large enterprises. While the vulnerability itself does not directly compromise system integrity or availability, the secondary effects of successful phishing campaigns can lead to data breaches, financial fraud, and reputational damage. Additionally, the ease of exploitation without authentication and the widespread use of Liferay in Europe amplify the potential risk.
Mitigation Recommendations
Organizations should immediately review their Liferay Portal deployments and identify if they are running affected versions. Although no patch links are provided, it is critical to monitor Liferay's official security advisories and apply vendor-released patches as soon as they become available. In the interim, administrators can implement strict input validation and URL whitelisting on the 'redirect' parameter to ensure only trusted internal URLs are accepted. Web Application Firewalls (WAFs) can be configured to detect and block suspicious redirect attempts. User awareness training should be enhanced to educate employees about the risks of clicking on unexpected links, even if they appear to come from trusted portals. Additionally, organizations should audit their public-facing URLs and communications to minimize exposure to crafted malicious links. Logging and monitoring of redirect parameter usage can help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-43767: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
Description
Open Redirect vulnerability in /c/portal/edit_info_item parameter redirect in Liferay Portal 7.4.3.86 through 7.4.3.131, and Liferay DXP 2024.Q3.1 through 2024.Q3.9, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12 and 7.4 update 86 through update 92 allows an attacker to exploit this security vulnerability to redirect users to a malicious site.
AI-Powered Analysis
Technical Analysis
CVE-2025-43767 is an Open Redirect vulnerability (CWE-601) identified in multiple versions of the Liferay Portal product, specifically versions 7.4.3.86 through 7.4.3.131, and various releases of Liferay DXP 2024.Q1 through 2024.Q3, including updates 86 through 92 of version 7.4. The vulnerability exists in the /c/portal/edit_info_item endpoint, where the 'redirect' parameter can be manipulated by an attacker to redirect users to arbitrary, potentially malicious external websites. This flaw arises because the application fails to properly validate or restrict the URLs provided in the redirect parameter, allowing attackers to craft URLs that appear legitimate but redirect victims to phishing sites, malware distribution points, or other harmful destinations. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that the vulnerability is remotely exploitable without authentication, requires no privileges, but does require user interaction (clicking a crafted link). The impact on confidentiality and integrity is limited, but availability impact is negligible. No known exploits are currently reported in the wild, and no patches are linked in the provided data, indicating that remediation may still be pending or in progress. This vulnerability primarily facilitates social engineering attacks by leveraging user trust in the legitimate Liferay Portal domain to redirect users to malicious sites.
Potential Impact
For European organizations using Liferay Portal, this vulnerability poses a significant risk primarily in the form of phishing and social engineering attacks. Attackers can exploit the open redirect to craft URLs that appear to originate from a trusted corporate portal, increasing the likelihood that users will follow malicious links. This can lead to credential theft, malware infections, or unauthorized access to sensitive information if users are redirected to fake login pages or exploit sites. The impact is particularly concerning for sectors with high reliance on Liferay Portal for internal or customer-facing services, such as government agencies, financial institutions, and large enterprises. While the vulnerability itself does not directly compromise system integrity or availability, the secondary effects of successful phishing campaigns can lead to data breaches, financial fraud, and reputational damage. Additionally, the ease of exploitation without authentication and the widespread use of Liferay in Europe amplify the potential risk.
Mitigation Recommendations
Organizations should immediately review their Liferay Portal deployments and identify if they are running affected versions. Although no patch links are provided, it is critical to monitor Liferay's official security advisories and apply vendor-released patches as soon as they become available. In the interim, administrators can implement strict input validation and URL whitelisting on the 'redirect' parameter to ensure only trusted internal URLs are accepted. Web Application Firewalls (WAFs) can be configured to detect and block suspicious redirect attempts. User awareness training should be enhanced to educate employees about the risks of clicking on unexpected links, even if they appear to come from trusted portals. Additionally, organizations should audit their public-facing URLs and communications to minimize exposure to crafted malicious links. Logging and monitoring of redirect parameter usage can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-17T10:55:26.804Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a939e3ad5a09ad00267457
Added to database: 8/23/2025, 3:47:47 AM
Last enriched: 8/23/2025, 4:02:46 AM
Last updated: 8/23/2025, 4:02:46 AM
Views: 2
Related Threats
CVE-2025-43764: CWE-1333 Inefficient Regular Expression Complexity in Liferay Portal
MediumCVE-2025-43765: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-9131: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ogulo Ogulo – 360° Tour
MediumCVE-2025-9048: CWE-73 External Control of File Name or Path in wptobe Wptobe-memberships
HighCVE-2025-8062: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wen-solutions WS Theme Addons
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.