Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43814: CWE-201 Insertion of Sensitive Information Into Sent Data in Liferay Portal

0
Medium
VulnerabilityCVE-2025-43814cvecve-2025-43814cwe-201
Published: Mon Sep 22 2025 (09/22/2025, 23:01:21 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

In Liferay Portal 7.4.0 through 7.4.3.112, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions the audit events records a user’s password reminder answer, which allows remote authenticated users to obtain a user’s password reminder answer via the audit events.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:25:09 UTC

Technical Analysis

CVE-2025-43814 is a medium severity vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, including 7.4.0 through 7.4.3.112, 7.4 GA through update 92, and various 2023 Q3 and Q4 releases. The vulnerability is classified under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, the issue arises because the audit event logs record a user's password reminder answer in plaintext. This sensitive information is accessible to remote authenticated users who have the necessary privileges to view audit events. Since the password reminder answer is often used as a secondary authentication factor or for account recovery, its exposure can facilitate unauthorized account access or further social engineering attacks. The CVSS 4.0 score is 6.9 (medium), reflecting that the vulnerability can be exploited remotely without user interaction but requires authenticated access with high privileges. The vulnerability does not impact confidentiality, integrity, or availability of the system broadly but compromises sensitive user information confidentiality within audit logs. There are no known exploits in the wild as of the publication date, and no official patches have been linked yet. The root cause is improper handling and logging of sensitive data within audit events, violating best practices for sensitive information management.

Potential Impact

For European organizations using Liferay Portal or Liferay DXP, this vulnerability poses a risk of sensitive credential information leakage. Attackers with authenticated access to audit logs can retrieve password reminder answers, potentially enabling account takeover or lateral movement within the organization. This risk is particularly critical for organizations with large user bases or those that rely on password reminders for account recovery. The exposure of such sensitive data can lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. Additionally, if attackers leverage this information to escalate privileges or access sensitive business data, it could lead to data breaches or operational disruptions. The impact is heightened in sectors with strict compliance requirements such as finance, healthcare, and government entities prevalent in Europe.

Mitigation Recommendations

Organizations should immediately audit their Liferay Portal and DXP installations to identify affected versions. Until patches are available, restrict access to audit event logs strictly to the minimum necessary personnel with high trust levels. Implement additional monitoring and alerting on audit log access to detect suspicious activity. Consider disabling or limiting audit logging of sensitive user information if configurable. Review and update internal policies to ensure sensitive data is never logged in plaintext. When patches become available from Liferay, prioritize their deployment. Additionally, enforce strong authentication and authorization controls around audit log access, including multi-factor authentication and role-based access controls. Conduct user awareness training to mitigate risks from compromised password reminder answers. Finally, review and enhance incident response plans to address potential exploitation scenarios involving leaked password reminder answers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-04-17T10:55:35.683Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d1d6fd72b9f38792d8c740

Added to database: 9/22/2025, 11:08:45 PM

Last enriched: 9/30/2025, 1:25:09 AM

Last updated: 11/5/2025, 11:56:16 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats