Skip to main content

CVE-2025-43809: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal

Medium
VulnerabilityCVE-2025-43809cvecve-2025-43809cwe-352
Published: Fri Sep 19 2025 (09/19/2025, 19:15:50 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Cross-Site Request Forgery (CSRF) vulnerability in the server (license) registration page in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.7, 2023.Q3.1 through 2023.Q3.9, 7.4 GA through update 92, and older unsupported versions allows remote attackers to register a server license via the 'orderUuid' parameter.

AI-Powered Analysis

AILast updated: 09/19/2025, 19:37:49 UTC

Technical Analysis

CVE-2025-43809 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Liferay Portal and Liferay DXP products across multiple versions, including 7.4.0 through 7.4.3.111, 7.4 GA through update 92, and various 2023 Q3 and Q4 releases. The vulnerability specifically affects the server license registration page, where an attacker can exploit the 'orderUuid' parameter to register a server license without proper authorization. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing unintended actions. In this case, the lack of adequate CSRF protections on the license registration endpoint allows remote attackers to perform unauthorized license registrations. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that the attack vector is network-based, requires no privileges, and no authentication, but does require user interaction (UI:A). The vulnerability does not impact confidentiality or availability directly but affects integrity by allowing unauthorized license registration, potentially leading to license misuse or unauthorized feature activation. No known exploits are reported in the wild yet, and no patches are currently linked, indicating that organizations should prioritize mitigation to prevent future exploitation. The vulnerability affects both supported and older unsupported versions, increasing the risk for organizations running legacy Liferay Portal or DXP instances.

Potential Impact

For European organizations using Liferay Portal or DXP, this vulnerability could lead to unauthorized license registrations, which may result in financial losses due to license misuse or compliance violations. Additionally, attackers could leverage this flaw to manipulate licensing states, potentially enabling unauthorized features or bypassing license restrictions. While the vulnerability does not directly compromise data confidentiality or system availability, the integrity of licensing and associated business processes is at risk. Organizations in sectors relying heavily on Liferay for customer portals, intranets, or digital experience platforms—such as finance, government, healthcare, and telecommunications—may face operational disruptions or reputational damage if attackers exploit this vulnerability. Moreover, unauthorized license registrations could complicate audits and compliance with software licensing agreements, leading to legal and financial repercussions.

Mitigation Recommendations

To mitigate CVE-2025-43809, European organizations should: 1) Immediately review and restrict access to the license registration page to trusted administrators only, implementing strict access controls and network segmentation where possible. 2) Implement or verify the presence of anti-CSRF tokens on all forms and endpoints related to license registration to ensure requests are legitimate and user-initiated. 3) Monitor web server logs and application logs for unusual or repeated requests to the license registration endpoint, especially those containing the 'orderUuid' parameter, to detect potential exploitation attempts. 4) Upgrade Liferay Portal and DXP to the latest patched versions as soon as they become available from the vendor, or apply any recommended workarounds or configuration changes provided by Liferay. 5) Educate administrators and users about the risks of CSRF attacks and encourage cautious behavior regarding unsolicited links or requests that could trigger license registration actions. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the license registration functionality. 7) Conduct regular security assessments and penetration tests focusing on web application vulnerabilities, including CSRF, to proactively identify and remediate weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:33.793Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cdad924b8a032c4faccd88

Added to database: 9/19/2025, 7:22:58 PM

Last enriched: 9/19/2025, 7:37:49 PM

Last updated: 9/21/2025, 12:09:39 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats