CVE-2025-43806: CWE-863 Incorrect Authorization in Liferay Portal
Batch Engine in Liferay Portal 7.4.0 through 7.4.3.112, and Liferay DXP 2023.Q4.0 through 2023.Q4.7, 2023.Q3.1 through 2023.Q3.10, and 7.4 GA through update 92 does not properly check permission with import and export tasks, which allows remote authenticated users to access the exported data via the REST APIs.
AI Analysis
Technical Summary
CVE-2025-43806 is a medium-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.112, and various 2023 quarterly releases up to Q4.7, as well as 7.4 GA through update 92. The vulnerability arises from an incorrect authorization check (CWE-863) in the Batch Engine component responsible for handling import and export tasks via REST APIs. Remote authenticated users can exploit this flaw to access exported data without proper permission validation. This means that users with valid credentials but limited privileges could retrieve sensitive data that should be restricted, potentially leading to unauthorized data disclosure. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that remediation may still be pending or in progress. The vulnerability highlights a critical gap in access control enforcement within the Liferay Batch Engine's REST API endpoints, which could be leveraged by attackers to bypass intended data access restrictions.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of unauthorized data exposure. Since Liferay is widely used for enterprise content management, intranet portals, and customer-facing web applications, sensitive business data, user information, or proprietary content could be accessed by unauthorized internal users or attackers who have gained low-level credentials. This could lead to data breaches, loss of confidentiality, and potential compliance violations under GDPR, especially if personal data is involved. The medium severity suggests that while the vulnerability is not trivially exploitable by unauthenticated attackers, the requirement for authenticated access means insider threats or compromised accounts could be leveraged. The lack of user interaction needed increases the risk of automated exploitation once credentials are obtained. The impact on data integrity is limited but possible if attackers manipulate export/import tasks. Availability is not affected, so service disruption is unlikely. Overall, the vulnerability could undermine trust in Liferay-based portals and lead to regulatory and reputational damage for European entities.
Mitigation Recommendations
Organizations should immediately audit their Liferay Portal and DXP deployments to identify affected versions. Until official patches are released, implement strict access controls on REST API endpoints related to import/export tasks, restricting them to highly trusted users only. Monitor logs for unusual access patterns to these APIs, especially from accounts with limited privileges. Employ network segmentation and firewall rules to limit exposure of Liferay management interfaces. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Review and tighten user roles and permissions to minimize the number of users with access to Batch Engine functionalities. Consider temporarily disabling or restricting batch import/export features if feasible. Stay alert for vendor advisories and apply security patches promptly once available. Additionally, conduct regular security assessments and penetration tests focusing on API authorization controls to detect similar weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-43806: CWE-863 Incorrect Authorization in Liferay Portal
Description
Batch Engine in Liferay Portal 7.4.0 through 7.4.3.112, and Liferay DXP 2023.Q4.0 through 2023.Q4.7, 2023.Q3.1 through 2023.Q3.10, and 7.4 GA through update 92 does not properly check permission with import and export tasks, which allows remote authenticated users to access the exported data via the REST APIs.
AI-Powered Analysis
Technical Analysis
CVE-2025-43806 is a medium-severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.112, and various 2023 quarterly releases up to Q4.7, as well as 7.4 GA through update 92. The vulnerability arises from an incorrect authorization check (CWE-863) in the Batch Engine component responsible for handling import and export tasks via REST APIs. Remote authenticated users can exploit this flaw to access exported data without proper permission validation. This means that users with valid credentials but limited privileges could retrieve sensitive data that should be restricted, potentially leading to unauthorized data disclosure. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that remediation may still be pending or in progress. The vulnerability highlights a critical gap in access control enforcement within the Liferay Batch Engine's REST API endpoints, which could be leveraged by attackers to bypass intended data access restrictions.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of unauthorized data exposure. Since Liferay is widely used for enterprise content management, intranet portals, and customer-facing web applications, sensitive business data, user information, or proprietary content could be accessed by unauthorized internal users or attackers who have gained low-level credentials. This could lead to data breaches, loss of confidentiality, and potential compliance violations under GDPR, especially if personal data is involved. The medium severity suggests that while the vulnerability is not trivially exploitable by unauthenticated attackers, the requirement for authenticated access means insider threats or compromised accounts could be leveraged. The lack of user interaction needed increases the risk of automated exploitation once credentials are obtained. The impact on data integrity is limited but possible if attackers manipulate export/import tasks. Availability is not affected, so service disruption is unlikely. Overall, the vulnerability could undermine trust in Liferay-based portals and lead to regulatory and reputational damage for European entities.
Mitigation Recommendations
Organizations should immediately audit their Liferay Portal and DXP deployments to identify affected versions. Until official patches are released, implement strict access controls on REST API endpoints related to import/export tasks, restricting them to highly trusted users only. Monitor logs for unusual access patterns to these APIs, especially from accounts with limited privileges. Employ network segmentation and firewall rules to limit exposure of Liferay management interfaces. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Review and tighten user roles and permissions to minimize the number of users with access to Batch Engine functionalities. Consider temporarily disabling or restricting batch import/export features if feasible. Stay alert for vendor advisories and apply security patches promptly once available. Additionally, conduct regular security assessments and penetration tests focusing on API authorization controls to detect similar weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-04-17T10:55:33.793Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d1e592efb46fd030526285
Added to database: 9/23/2025, 12:10:58 AM
Last enriched: 9/30/2025, 1:20:42 AM
Last updated: 10/7/2025, 1:45:26 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.