Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43813: CWE-22: Path Traversal in Liferay Portal

0
Medium
VulnerabilityCVE-2025-43813cvecve-2025-43813cwe-22
Published: Mon Sep 29 2025 (09/29/2025, 22:19:02 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Possible path traversal vulnerability and denial-of-service in the ComboServlet in Liferay Portal 7.4.0 through 7.4.3.107, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.4, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to access arbitrary CSS and JSS files and load the files multiple times via the query string in a URL.

AI-Powered Analysis

AILast updated: 10/07/2025, 00:48:45 UTC

Technical Analysis

CVE-2025-43813 is a path traversal vulnerability categorized under CWE-22, affecting multiple versions of Liferay Portal and Liferay DXP, including 7.4.0 through 7.4.3.107 and various 2023 Q3 and Q4 releases. The vulnerability resides in the ComboServlet, a component responsible for aggregating CSS and JavaScript resources. By manipulating the query string parameters in HTTP requests, an unauthenticated remote attacker can traverse directories and access arbitrary CSS and JavaScript files outside the intended resource directories. This unauthorized access could expose sensitive information embedded in these files or enable further attacks such as injecting malicious scripts. Additionally, the vulnerability allows attackers to repeatedly load these resources, potentially causing denial-of-service conditions by exhausting server resources or bandwidth. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality and availability. No known exploits have been reported in the wild to date. The vulnerability affects a broad range of Liferay Portal versions, including some older unsupported releases, increasing the attack surface for organizations that have not maintained up-to-date software. The lack of vendor patches at the time of publication necessitates immediate attention to mitigate risks.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of internal CSS and JavaScript files, which may contain sensitive configuration details or proprietary code, thereby impacting confidentiality. The ability to repeatedly load these resources can degrade service availability, potentially disrupting business operations reliant on Liferay Portal. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that use Liferay Portal for web content management or intranet services are particularly at risk. Exploitation could facilitate further attacks like cross-site scripting (XSS) if malicious scripts are injected or leveraged. The broad range of affected versions means many organizations may be vulnerable, especially those with delayed patch management or using unsupported versions. The medium severity rating indicates a moderate but tangible risk that could escalate if combined with other vulnerabilities or attack vectors.

Mitigation Recommendations

European organizations should immediately audit their Liferay Portal deployments to identify affected versions. Until official patches are released, implement strict input validation and sanitization on the ComboServlet query parameters to prevent directory traversal sequences (e.g., ../). Employ web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting the ComboServlet. Restrict access to the ComboServlet endpoint to trusted internal networks or authenticated users where feasible. Monitor web server logs for unusual access patterns or repeated requests to CSS and JavaScript resources that could indicate exploitation attempts. Plan and prioritize upgrading to patched versions of Liferay Portal as soon as they become available. Additionally, conduct security awareness training for administrators to recognize signs of exploitation and maintain robust incident response capabilities. Consider isolating Liferay Portal instances in segmented network zones to limit potential lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:35.683Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68db1fa6a473ffe031e2789c

Added to database: 9/30/2025, 12:09:10 AM

Last enriched: 10/7/2025, 12:48:45 AM

Last updated: 10/7/2025, 1:50:36 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats