Skip to main content

CVE-2025-43768: CWE-201: Insertion of Sensitive Information Into Sent Data in Liferay Portal

Medium
VulnerabilityCVE-2025-43768cvecve-2025-43768cwe-201
Published: Sat Aug 23 2025 (08/23/2025, 03:04:06 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Liferay Portal 7.4.0 through 7.4.3.131, and Liferay DXP 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allows authenticated users without any permissions to access sensitive information of admin users using JSONWS APIs.

AI-Powered Analysis

AILast updated: 08/31/2025, 01:08:40 UTC

Technical Analysis

CVE-2025-43768 is a medium-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.131, and various 2024 quarterly releases of Liferay DXP (Q1 through Q4) as well as 7.4 GA through update 92. The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. In this case, the flaw allows authenticated users with no special permissions to access sensitive information belonging to administrative users via the JSON Web Services (JSONWS) APIs. This means that even users with minimal privileges can leverage the API to retrieve confidential data about administrators, potentially exposing credentials, configuration details, or other sensitive metadata. The CVSS 4.0 vector indicates the attack requires network access (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction is required (UI:P), and results in low confidentiality impact (VC:L) with no impact on integrity or availability. The vulnerability does not appear to have known exploits in the wild yet, but the exposure of admin sensitive data could facilitate further attacks such as privilege escalation or targeted compromise of the portal environment. The issue stems from insufficient access control enforcement on the JSONWS API endpoints, allowing unauthorized data leakage. Given Liferay Portal's widespread use in enterprise content management and intranet portals, this vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations using Liferay Portal or Liferay DXP, this vulnerability could lead to unauthorized disclosure of sensitive administrative information. Such data leakage can undermine the confidentiality of critical system credentials or configuration details, potentially enabling attackers to escalate privileges or conduct further targeted attacks within the corporate network. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. The exposure of admin data could also violate GDPR mandates on data security, leading to regulatory penalties and reputational damage. Since the vulnerability requires only authenticated access with minimal privileges, it increases the risk from insider threats or compromised low-privilege accounts. The medium severity rating reflects the moderate confidentiality impact but limited integrity and availability effects. However, the potential for lateral movement and deeper compromise elevates the overall risk posture for affected organizations.

Mitigation Recommendations

European organizations should immediately audit their Liferay Portal and DXP deployments to identify affected versions. Since no patch links are provided, organizations should monitor Liferay's official channels for security updates or hotfixes addressing CVE-2025-43768. In the interim, restrict access to JSONWS APIs to trusted users only and implement strict network segmentation to limit exposure. Employ robust authentication and session management controls to reduce the risk of compromised low-privilege accounts. Review and tighten API permissions and consider disabling JSONWS APIs if not required. Conduct thorough logging and monitoring of API access to detect anomalous behavior indicative of exploitation attempts. Additionally, perform regular security assessments and penetration testing focused on API endpoints to identify and remediate similar access control weaknesses. Finally, educate users about the risks of privilege misuse and enforce the principle of least privilege across the portal environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:26.804Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a932dcad5a09ad00262a68

Added to database: 8/23/2025, 3:17:48 AM

Last enriched: 8/31/2025, 1:08:40 AM

Last updated: 9/1/2025, 12:34:20 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats