Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62241: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay DXP

0
Medium
VulnerabilityCVE-2025-62241cvecve-2025-62241cwe-639
Published: Mon Oct 13 2025 (10/13/2025, 19:32:15 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: DXP

Description

Insecure Direct Object Reference (IDOR) vulnerability with shipment addresses in Liferay DXP 2023.Q4.1 through 2023.Q4.5 allows remote authenticated users to from one virtual instance to view the shipment addresses of different virtual instance via the _com_liferay_commerce_order_web_internal_portlet_CommerceOrderPortlet_commerceOrderId parameter.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:42:16 UTC

Technical Analysis

CVE-2025-62241 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Liferay DXP versions 2023.Q4.0 through 2023.Q4.5. The flaw arises from an Insecure Direct Object Reference (IDOR) in the handling of shipment addresses within the CommerceOrderPortlet component. Specifically, remote authenticated users can manipulate the _com_liferay_commerce_order_web_internal_portlet_CommerceOrderPortlet_commerceOrderId parameter to access shipment address data belonging to other virtual instances hosted on the same Liferay DXP deployment. Virtual instances are isolated tenant environments within Liferay, and this vulnerability breaks that isolation, allowing cross-tenant data leakage. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity, but it does require the attacker to be authenticated. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L), with no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. This issue highlights a critical design flaw in access control enforcement for multi-tenant environments in Liferay DXP's commerce module.

Potential Impact

The primary impact of CVE-2025-62241 is unauthorized disclosure of shipment address information across virtual instances, which compromises confidentiality. For European organizations, this could lead to exposure of sensitive customer or partner shipping data, potentially violating GDPR and other data protection regulations. The breach of tenant isolation undermines trust in multi-tenant deployments and could expose business-sensitive logistics information. While the vulnerability does not affect integrity or availability, the leakage of shipment addresses could facilitate further targeted attacks such as social engineering or fraud. Organizations operating e-commerce or supply chain portals on Liferay DXP are at higher risk. The medium severity score reflects the moderate impact and the requirement for authenticated access, but the ease of exploitation and cross-tenant data leakage make it a significant concern for enterprises handling sensitive commerce data.

Mitigation Recommendations

To mitigate CVE-2025-62241, organizations should first apply any official patches or updates from Liferay once available. In the absence of patches, administrators should review and tighten access control policies for virtual instances, ensuring strict tenant isolation is enforced at the application and database layers. Implementing additional validation on the commerceOrderId parameter to verify ownership before disclosing shipment data is critical. Monitoring and logging access to commerce order data can help detect anomalous cross-tenant access attempts. Restricting access to the CommerceOrderPortlet to only trusted users and roles reduces the attack surface. Network segmentation and multi-factor authentication for portal access can further reduce risk. Regular security assessments and penetration testing focused on multi-tenancy controls are recommended to identify similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-10-09T20:58:49.217Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ed566e06a2a330d3233343

Added to database: 10/13/2025, 7:43:42 PM

Last enriched: 10/21/2025, 12:42:16 AM

Last updated: 12/4/2025, 6:29:27 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats