CVE-2025-43808: CWE-732 Incorrect Permission Assignment for Critical Resource in Liferay Portal
The Commerce component in Liferay Portal 7.3.0 through 7.4.3.112, and Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and 7.3 service pack 3 through update 35 saves virtual products uploaded to Documents and Media with guest view permission, which allows remote attackers to access and download virtual products for free via a crafted URL.
AI Analysis
Technical Summary
CVE-2025-43808 is a vulnerability identified in the Commerce component of Liferay Portal versions 7.3.0 through 7.4.3.112 and various Liferay DXP releases from 2023.Q3.1 through 2023.Q4.8, including 7.4 GA through update 92 and 7.3 service pack 3 through update 35. The issue stems from incorrect permission assignment (CWE-732) where virtual products uploaded to the Documents and Media repository are saved with guest view permissions by default. This misconfiguration allows unauthenticated remote attackers to access and download these virtual products freely by crafting specific URLs, bypassing intended access controls. The vulnerability does not require authentication or user interaction, and it affects confidentiality by exposing potentially sensitive or paid digital content without authorization. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The root cause is improper access control on critical resources within the portal's commerce module, leading to unauthorized data disclosure risks.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP with the affected versions, this vulnerability can lead to unauthorized access and free download of virtual products, causing direct financial losses and intellectual property theft. Organizations relying on Liferay Commerce for digital goods sales risk revenue leakage and erosion of customer trust. Additionally, exposure of sensitive product data could harm competitive advantage and violate data protection regulations if personal or proprietary information is embedded within virtual products. The lack of authentication requirement means attackers can exploit this vulnerability remotely without prior access, increasing the attack surface. This can also lead to reputational damage and potential legal consequences under GDPR if customer data is indirectly exposed. The medium severity rating indicates a significant but not catastrophic impact, emphasizing the need for timely remediation to prevent exploitation.
Mitigation Recommendations
Organizations should immediately audit their Liferay Portal and DXP environments to identify the presence of affected versions. Until official patches are released, administrators should manually review and adjust permissions on Documents and Media repositories, specifically ensuring that virtual products do not have guest or public view permissions. Implement strict access control policies restricting document visibility to authenticated and authorized users only. Employ web application firewalls (WAF) to monitor and block suspicious URL patterns that attempt to access virtual product resources. Regularly monitor logs for unusual download activity indicative of exploitation attempts. Additionally, consider disabling or restricting the Commerce component if not in active use. Stay updated with Liferay security advisories for patch releases and apply them promptly once available. Conduct internal penetration testing focusing on access control weaknesses in the portal's media storage areas.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-43808: CWE-732 Incorrect Permission Assignment for Critical Resource in Liferay Portal
Description
The Commerce component in Liferay Portal 7.3.0 through 7.4.3.112, and Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and 7.3 service pack 3 through update 35 saves virtual products uploaded to Documents and Media with guest view permission, which allows remote attackers to access and download virtual products for free via a crafted URL.
AI-Powered Analysis
Technical Analysis
CVE-2025-43808 is a vulnerability identified in the Commerce component of Liferay Portal versions 7.3.0 through 7.4.3.112 and various Liferay DXP releases from 2023.Q3.1 through 2023.Q4.8, including 7.4 GA through update 92 and 7.3 service pack 3 through update 35. The issue stems from incorrect permission assignment (CWE-732) where virtual products uploaded to the Documents and Media repository are saved with guest view permissions by default. This misconfiguration allows unauthenticated remote attackers to access and download these virtual products freely by crafting specific URLs, bypassing intended access controls. The vulnerability does not require authentication or user interaction, and it affects confidentiality by exposing potentially sensitive or paid digital content without authorization. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The root cause is improper access control on critical resources within the portal's commerce module, leading to unauthorized data disclosure risks.
Potential Impact
For European organizations using Liferay Portal or Liferay DXP with the affected versions, this vulnerability can lead to unauthorized access and free download of virtual products, causing direct financial losses and intellectual property theft. Organizations relying on Liferay Commerce for digital goods sales risk revenue leakage and erosion of customer trust. Additionally, exposure of sensitive product data could harm competitive advantage and violate data protection regulations if personal or proprietary information is embedded within virtual products. The lack of authentication requirement means attackers can exploit this vulnerability remotely without prior access, increasing the attack surface. This can also lead to reputational damage and potential legal consequences under GDPR if customer data is indirectly exposed. The medium severity rating indicates a significant but not catastrophic impact, emphasizing the need for timely remediation to prevent exploitation.
Mitigation Recommendations
Organizations should immediately audit their Liferay Portal and DXP environments to identify the presence of affected versions. Until official patches are released, administrators should manually review and adjust permissions on Documents and Media repositories, specifically ensuring that virtual products do not have guest or public view permissions. Implement strict access control policies restricting document visibility to authenticated and authorized users only. Employ web application firewalls (WAF) to monitor and block suspicious URL patterns that attempt to access virtual product resources. Regularly monitor logs for unusual download activity indicative of exploitation attempts. Additionally, consider disabling or restricting the Commerce component if not in active use. Stay updated with Liferay security advisories for patch releases and apply them promptly once available. Conduct internal penetration testing focusing on access control weaknesses in the portal's media storage areas.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - Liferay
 - Date Reserved
 - 2025-04-17T10:55:33.793Z
 - Cvss Version
 - 4.0
 - State
 - PUBLISHED
 
Threat ID: 68cdc2a44b8a032c4fad9eea
Added to database: 9/19/2025, 8:52:52 PM
Last enriched: 9/27/2025, 12:53:40 AM
Last updated: 11/3/2025, 3:20:18 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12614: SQL Injection in SourceCodester Best House Rental Management System
MediumCVE-2025-12612: SQL Injection in Campcodes School Fees Payment Management System
MediumCVE-2025-12611: Buffer Overflow in Tenda AC21
HighCVE-2025-12610: SQL Injection in CodeAstro Gym Management System
MediumCVE-2025-12609: SQL Injection in CodeAstro Gym Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.