Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43805: CWE-862: Missing Authorization in Liferay Portal

0
Medium
VulnerabilityCVE-2025-43805cvecve-2025-43805cwe-862
Published: Tue Sep 16 2025 (09/16/2025, 21:33:50 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Liferay Portal 7.3.0 through 7.4.3.111, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, and 7.3 GA through update 35 does not perform an authorization check when users attempt to view a display page template, which allows remote attackers to view display page templates via crafted URLs.

AI-Powered Analysis

AILast updated: 09/24/2025, 01:15:21 UTC

Technical Analysis

CVE-2025-43805 is a medium-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.3.0 through 7.4.3.111, and various quarterly releases of Liferay DXP in 2023. The vulnerability is classified under CWE-862, which indicates a missing authorization check. In this case, the Liferay Portal does not properly verify whether a user has the necessary permissions before allowing access to view display page templates. This flaw enables remote attackers to access these templates simply by crafting specific URLs, without requiring any authentication or user interaction. Display page templates in Liferay are used to define how content is presented to end users, and unauthorized access to these templates could expose sensitive design or content structure information, potentially aiding further attacks or information gathering. The CVSS 4.0 base score is 6.9, reflecting a medium severity level, with an attack vector that is network-based, low attack complexity, no privileges or user interaction required, and limited impact confined to confidentiality (viewing templates). There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability affects the confidentiality of the system by allowing unauthorized viewing of internal templates but does not impact integrity or availability. The lack of authorization checks represents a fundamental security oversight in access control mechanisms within the affected Liferay versions.

Potential Impact

For European organizations using Liferay Portal or Liferay DXP, this vulnerability could lead to unauthorized disclosure of internal display page templates. While this does not directly compromise user data or system integrity, it can provide attackers with valuable insight into the structure and design of web content, which may facilitate more targeted attacks such as phishing, social engineering, or further exploitation of other vulnerabilities. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, may face compliance risks if sensitive information is indirectly exposed. Additionally, public sector entities and large enterprises that rely on Liferay for content management and digital experience platforms could see reputational damage if attackers leverage this information to craft convincing attacks or demonstrate security weaknesses. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the risk of automated scanning and reconnaissance by malicious actors.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Monitor Liferay’s official security advisories closely for patches addressing CVE-2025-43805 and apply updates promptly once available. 2) Implement strict network-level access controls to restrict access to Liferay administrative and content management interfaces, limiting exposure to trusted internal networks or VPNs. 3) Use web application firewalls (WAFs) to detect and block suspicious URL patterns that attempt to access display page templates without proper authorization. 4) Conduct internal audits and penetration testing focused on authorization checks within Liferay deployments to identify and remediate similar access control weaknesses. 5) Review and harden user roles and permissions within Liferay to ensure minimal necessary access is granted, reducing the potential impact of unauthorized template viewing. 6) Employ monitoring and logging to detect unusual access patterns to display page templates or other sensitive resources. These steps go beyond generic advice by focusing on compensating controls and proactive detection until official patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:33.792Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c9d97f378f59cc24092211

Added to database: 9/16/2025, 9:41:19 PM

Last enriched: 9/24/2025, 1:15:21 AM

Last updated: 10/30/2025, 12:17:20 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats