Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43808: CWE-732 Incorrect Permission Assignment for Critical Resource in Liferay Portal

0
Medium
VulnerabilityCVE-2025-43808cvecve-2025-43808cwe-732
Published: Fri Sep 19 2025 (09/19/2025, 20:37:22 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

The Commerce component in Liferay Portal 7.3.0 through 7.4.3.112, and Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and 7.3 service pack 3 through update 35 saves virtual products uploaded to Documents and Media with guest view permission, which allows remote attackers to access and download virtual products for free via a crafted URL.

AI-Powered Analysis

AILast updated: 09/27/2025, 00:53:40 UTC

Technical Analysis

CVE-2025-43808 is a vulnerability identified in the Commerce component of Liferay Portal versions 7.3.0 through 7.4.3.112 and various Liferay DXP releases from 2023.Q3.1 through 2023.Q4.8, including 7.4 GA through update 92 and 7.3 service pack 3 through update 35. The issue stems from incorrect permission assignment (CWE-732) where virtual products uploaded to the Documents and Media repository are saved with guest view permissions by default. This misconfiguration allows unauthenticated remote attackers to access and download these virtual products freely by crafting specific URLs, bypassing intended access controls. The vulnerability does not require authentication or user interaction, and it affects confidentiality by exposing potentially sensitive or paid digital content without authorization. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The root cause is improper access control on critical resources within the portal's commerce module, leading to unauthorized data disclosure risks.

Potential Impact

For European organizations using Liferay Portal or Liferay DXP with the affected versions, this vulnerability can lead to unauthorized access and free download of virtual products, causing direct financial losses and intellectual property theft. Organizations relying on Liferay Commerce for digital goods sales risk revenue leakage and erosion of customer trust. Additionally, exposure of sensitive product data could harm competitive advantage and violate data protection regulations if personal or proprietary information is embedded within virtual products. The lack of authentication requirement means attackers can exploit this vulnerability remotely without prior access, increasing the attack surface. This can also lead to reputational damage and potential legal consequences under GDPR if customer data is indirectly exposed. The medium severity rating indicates a significant but not catastrophic impact, emphasizing the need for timely remediation to prevent exploitation.

Mitigation Recommendations

Organizations should immediately audit their Liferay Portal and DXP environments to identify the presence of affected versions. Until official patches are released, administrators should manually review and adjust permissions on Documents and Media repositories, specifically ensuring that virtual products do not have guest or public view permissions. Implement strict access control policies restricting document visibility to authenticated and authorized users only. Employ web application firewalls (WAF) to monitor and block suspicious URL patterns that attempt to access virtual product resources. Regularly monitor logs for unusual download activity indicative of exploitation attempts. Additionally, consider disabling or restricting the Commerce component if not in active use. Stay updated with Liferay security advisories for patch releases and apply them promptly once available. Conduct internal penetration testing focusing on access control weaknesses in the portal's media storage areas.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:33.793Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cdc2a44b8a032c4fad9eea

Added to database: 9/19/2025, 8:52:52 PM

Last enriched: 9/27/2025, 12:53:40 AM

Last updated: 11/3/2025, 3:20:18 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats