CVE-2025-43767: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
Open Redirect vulnerability in /c/portal/edit_info_item parameter redirect in Liferay Portal 7.4.3.86 through 7.4.3.131, and Liferay DXP 2024.Q3.1 through 2024.Q3.9, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12 and 7.4 update 86 through update 92 allows an attacker to exploit this security vulnerability to redirect users to a malicious site.
AI Analysis
Technical Summary
CVE-2025-43767 is an Open Redirect vulnerability (CWE-601) identified in multiple versions of the Liferay Portal product, specifically versions 7.4.3.86 through 7.4.3.131, and various 2024 quarterly releases of Liferay DXP (2024.Q1.1 through 2024.Q3.9) as well as 7.4 updates 86 through 92. The vulnerability exists in the /c/portal/edit_info_item endpoint's redirect parameter, which improperly handles URL redirection. An attacker can craft a malicious URL that leverages this parameter to redirect users to an untrusted, potentially malicious external site. This type of vulnerability is commonly exploited in phishing attacks, where users are tricked into clicking seemingly legitimate links that lead to harmful websites, potentially resulting in credential theft, malware installation, or other social engineering exploits. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show that the attack requires no privileges (PR:N), no authentication (AT:N), but does require user interaction (UI:A). The vulnerability impacts confidentiality and integrity to a limited extent (VC:L, VI:L), with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that remediation may still be pending or available through vendor updates. Given the widespread use of Liferay Portal in enterprise environments, this vulnerability poses a risk primarily through social engineering and redirection to malicious sites, rather than direct system compromise.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in terms of user trust and potential data compromise through phishing campaigns. Liferay Portal is widely used in various sectors including government, education, and private enterprises across Europe, often serving as a central platform for intranet portals, content management, and collaboration. Successful exploitation could lead to users being redirected to malicious sites designed to harvest credentials or distribute malware, potentially resulting in unauthorized access to sensitive systems or data breaches. This could damage organizational reputation, lead to regulatory non-compliance under GDPR if personal data is compromised, and increase the risk of subsequent attacks leveraging stolen credentials. While the vulnerability itself does not allow direct system takeover, the indirect consequences through social engineering and credential theft can be severe. The requirement for user interaction means that user awareness and training are critical components of risk mitigation.
Mitigation Recommendations
Organizations should prioritize updating Liferay Portal to the latest patched versions as soon as they become available from the vendor to address this vulnerability. In the absence of immediate patches, administrators can implement strict input validation and URL whitelisting on the redirect parameters to prevent redirection to untrusted domains. Web Application Firewalls (WAFs) can be configured to detect and block suspicious redirect attempts. Additionally, organizations should enhance user awareness training focusing on phishing risks and the dangers of clicking on unexpected links, especially those involving redirects. Monitoring web server logs for unusual redirect patterns can help detect exploitation attempts. Employing multi-factor authentication (MFA) can mitigate the impact of credential theft resulting from phishing. Finally, organizations should review and tighten their portal's security policies and consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious content execution.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-43767: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
Description
Open Redirect vulnerability in /c/portal/edit_info_item parameter redirect in Liferay Portal 7.4.3.86 through 7.4.3.131, and Liferay DXP 2024.Q3.1 through 2024.Q3.9, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12 and 7.4 update 86 through update 92 allows an attacker to exploit this security vulnerability to redirect users to a malicious site.
AI-Powered Analysis
Technical Analysis
CVE-2025-43767 is an Open Redirect vulnerability (CWE-601) identified in multiple versions of the Liferay Portal product, specifically versions 7.4.3.86 through 7.4.3.131, and various 2024 quarterly releases of Liferay DXP (2024.Q1.1 through 2024.Q3.9) as well as 7.4 updates 86 through 92. The vulnerability exists in the /c/portal/edit_info_item endpoint's redirect parameter, which improperly handles URL redirection. An attacker can craft a malicious URL that leverages this parameter to redirect users to an untrusted, potentially malicious external site. This type of vulnerability is commonly exploited in phishing attacks, where users are tricked into clicking seemingly legitimate links that lead to harmful websites, potentially resulting in credential theft, malware installation, or other social engineering exploits. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show that the attack requires no privileges (PR:N), no authentication (AT:N), but does require user interaction (UI:A). The vulnerability impacts confidentiality and integrity to a limited extent (VC:L, VI:L), with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that remediation may still be pending or available through vendor updates. Given the widespread use of Liferay Portal in enterprise environments, this vulnerability poses a risk primarily through social engineering and redirection to malicious sites, rather than direct system compromise.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in terms of user trust and potential data compromise through phishing campaigns. Liferay Portal is widely used in various sectors including government, education, and private enterprises across Europe, often serving as a central platform for intranet portals, content management, and collaboration. Successful exploitation could lead to users being redirected to malicious sites designed to harvest credentials or distribute malware, potentially resulting in unauthorized access to sensitive systems or data breaches. This could damage organizational reputation, lead to regulatory non-compliance under GDPR if personal data is compromised, and increase the risk of subsequent attacks leveraging stolen credentials. While the vulnerability itself does not allow direct system takeover, the indirect consequences through social engineering and credential theft can be severe. The requirement for user interaction means that user awareness and training are critical components of risk mitigation.
Mitigation Recommendations
Organizations should prioritize updating Liferay Portal to the latest patched versions as soon as they become available from the vendor to address this vulnerability. In the absence of immediate patches, administrators can implement strict input validation and URL whitelisting on the redirect parameters to prevent redirection to untrusted domains. Web Application Firewalls (WAFs) can be configured to detect and block suspicious redirect attempts. Additionally, organizations should enhance user awareness training focusing on phishing risks and the dangers of clicking on unexpected links, especially those involving redirects. Monitoring web server logs for unusual redirect patterns can help detect exploitation attempts. Employing multi-factor authentication (MFA) can mitigate the impact of credential theft resulting from phishing. Finally, organizations should review and tighten their portal's security policies and consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious content execution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-17T10:55:26.804Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a939e3ad5a09ad00267457
Added to database: 8/23/2025, 3:47:47 AM
Last enriched: 8/31/2025, 1:08:30 AM
Last updated: 10/7/2025, 1:43:45 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.