CVE-2025-4655: CWE-918 Server-Side Request Forgery (SSRF) in Liferay Portal
SSRF vulnerability in FreeMarker templates in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 allows template editors to bypass access validations via crafted URLs.
AI Analysis
Technical Summary
CVE-2025-4655 is a Server-Side Request Forgery (SSRF) vulnerability identified in the FreeMarker template engine integration within Liferay Portal versions 7.4.0 through 7.4.3.132 and multiple Liferay DXP quarterly releases spanning 2024 and 2025. SSRF vulnerabilities occur when an attacker can manipulate a server-side application to send crafted HTTP requests to unintended locations, potentially bypassing network access controls. In this case, template editors with privileges to modify FreeMarker templates can craft malicious URLs that bypass existing access validation mechanisms. This enables them to coerce the server into making unauthorized requests to internal or external systems. The vulnerability is classified under CWE-918, indicating improper restriction of outbound requests by a server. The CVSS v4.0 base score is 5.1 (medium severity), reflecting that the attack vector is network-based, requires high privileges (template editor role), and does not require user interaction. The vulnerability does not impact confidentiality, integrity, or availability directly but can be leveraged to access internal resources or services that are otherwise inaccessible, potentially leading to further exploitation or information disclosure. No public exploits are currently known, and no patches have been linked yet. The vulnerability affects a broad range of Liferay DXP quarterly releases and the 7.4 GA line, indicating a widespread exposure for organizations using these versions.
Potential Impact
For European organizations utilizing Liferay Portal or Liferay DXP, this SSRF vulnerability poses a moderate risk. Liferay is widely used in enterprise portals, intranet sites, and customer-facing web applications across various sectors including government, finance, education, and healthcare in Europe. Exploitation could allow malicious insiders or compromised template editors to pivot into internal networks, access sensitive internal services, or exfiltrate data by abusing the server's network privileges. This could lead to unauthorized access to internal APIs, cloud metadata services, or other protected resources. While the vulnerability requires high privileges (template editor role), organizations with insufficient role segregation or weak internal controls are at greater risk. The lack of known public exploits reduces immediate threat but does not eliminate the risk of targeted attacks. The impact is particularly significant for organizations hosting sensitive data or critical services behind Liferay portals, as SSRF can be a stepping stone for more severe attacks such as internal reconnaissance, lateral movement, or data leakage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately audit and restrict template editor privileges to only trusted personnel, enforcing strict role-based access controls and separation of duties. 2) Monitor and review all FreeMarker template changes for suspicious or unauthorized modifications, employing code review and change management processes. 3) Implement network-level egress filtering to restrict the server's ability to make arbitrary outbound requests, especially to internal or sensitive endpoints. 4) Apply any vendor-provided patches or updates as soon as they become available. 5) Use Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns in HTTP requests. 6) Conduct internal penetration testing focusing on SSRF vectors within Liferay environments to identify and remediate potential exploitation paths. 7) Log and monitor outbound requests from Liferay servers for anomalies that could indicate SSRF exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-4655: CWE-918 Server-Side Request Forgery (SSRF) in Liferay Portal
Description
SSRF vulnerability in FreeMarker templates in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 allows template editors to bypass access validations via crafted URLs.
AI-Powered Analysis
Technical Analysis
CVE-2025-4655 is a Server-Side Request Forgery (SSRF) vulnerability identified in the FreeMarker template engine integration within Liferay Portal versions 7.4.0 through 7.4.3.132 and multiple Liferay DXP quarterly releases spanning 2024 and 2025. SSRF vulnerabilities occur when an attacker can manipulate a server-side application to send crafted HTTP requests to unintended locations, potentially bypassing network access controls. In this case, template editors with privileges to modify FreeMarker templates can craft malicious URLs that bypass existing access validation mechanisms. This enables them to coerce the server into making unauthorized requests to internal or external systems. The vulnerability is classified under CWE-918, indicating improper restriction of outbound requests by a server. The CVSS v4.0 base score is 5.1 (medium severity), reflecting that the attack vector is network-based, requires high privileges (template editor role), and does not require user interaction. The vulnerability does not impact confidentiality, integrity, or availability directly but can be leveraged to access internal resources or services that are otherwise inaccessible, potentially leading to further exploitation or information disclosure. No public exploits are currently known, and no patches have been linked yet. The vulnerability affects a broad range of Liferay DXP quarterly releases and the 7.4 GA line, indicating a widespread exposure for organizations using these versions.
Potential Impact
For European organizations utilizing Liferay Portal or Liferay DXP, this SSRF vulnerability poses a moderate risk. Liferay is widely used in enterprise portals, intranet sites, and customer-facing web applications across various sectors including government, finance, education, and healthcare in Europe. Exploitation could allow malicious insiders or compromised template editors to pivot into internal networks, access sensitive internal services, or exfiltrate data by abusing the server's network privileges. This could lead to unauthorized access to internal APIs, cloud metadata services, or other protected resources. While the vulnerability requires high privileges (template editor role), organizations with insufficient role segregation or weak internal controls are at greater risk. The lack of known public exploits reduces immediate threat but does not eliminate the risk of targeted attacks. The impact is particularly significant for organizations hosting sensitive data or critical services behind Liferay portals, as SSRF can be a stepping stone for more severe attacks such as internal reconnaissance, lateral movement, or data leakage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately audit and restrict template editor privileges to only trusted personnel, enforcing strict role-based access controls and separation of duties. 2) Monitor and review all FreeMarker template changes for suspicious or unauthorized modifications, employing code review and change management processes. 3) Implement network-level egress filtering to restrict the server's ability to make arbitrary outbound requests, especially to internal or sensitive endpoints. 4) Apply any vendor-provided patches or updates as soon as they become available. 5) Use Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns in HTTP requests. 6) Conduct internal penetration testing focusing on SSRF vectors within Liferay environments to identify and remediate potential exploitation paths. 7) Log and monitor outbound requests from Liferay servers for anomalies that could indicate SSRF exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-05-13T15:16:26.339Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6896d67aad5a09ad00091384
Added to database: 8/9/2025, 5:02:50 AM
Last enriched: 8/17/2025, 1:05:18 AM
Last updated: 11/6/2025, 10:27:25 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
MediumCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.