Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62241: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay DXP

0
Medium
VulnerabilityCVE-2025-62241cvecve-2025-62241cwe-639
Published: Mon Oct 13 2025 (10/13/2025, 19:32:15 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: DXP

Description

Insecure Direct Object Reference (IDOR) vulnerability with shipment addresses in Liferay DXP 2023.Q4.1 through 2023.Q4.5 allows remote authenticated users to from one virtual instance to view the shipment addresses of different virtual instance via the _com_liferay_commerce_order_web_internal_portlet_CommerceOrderPortlet_commerceOrderId parameter.

AI-Powered Analysis

AILast updated: 10/13/2025, 19:50:05 UTC

Technical Analysis

CVE-2025-62241 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in Liferay DXP versions 2023.Q4.0 through 2023.Q4.5. The flaw resides in the handling of shipment addresses within the CommerceOrderPortlet component, specifically via the _com_liferay_commerce_order_web_internal_portlet_CommerceOrderPortlet_commerceOrderId parameter. This parameter is user-controllable and insufficiently validated, allowing an authenticated user from one virtual instance to access shipment address data belonging to other virtual instances. Virtual instances in Liferay DXP are isolated environments designed to segregate data and users; this vulnerability breaks that isolation, leading to unauthorized data exposure. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required beyond authentication (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L), with no impact on integrity or availability. Although no public exploits are known, the vulnerability poses a risk to confidentiality of sensitive shipment information, which could include customer addresses and order details. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for monitoring and interim mitigations.

Potential Impact

For European organizations, especially those operating e-commerce platforms or managing customer orders through Liferay DXP, this vulnerability could lead to unauthorized disclosure of shipment addresses across virtual instances. This exposure risks violating data protection regulations such as the GDPR, potentially resulting in legal penalties and reputational damage. Confidential customer information leakage could also facilitate targeted phishing or physical security threats. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations with multi-tenant or multi-instance deployments are particularly vulnerable, as the flaw allows cross-instance data access that should be isolated. The medium CVSS score reflects moderate risk; however, the sensitivity of shipment data and regulatory environment in Europe elevate the practical impact. Although no active exploitation is reported, the vulnerability could be leveraged by insider threats or attackers with valid credentials to escalate data access beyond their privileges.

Mitigation Recommendations

European organizations should immediately review and restrict access controls on Liferay DXP virtual instances to ensure strict separation of user privileges. Implement monitoring and logging of commerceOrderId parameter usage to detect anomalous access patterns. Where possible, apply virtual instance segmentation at the network or application firewall level to prevent cross-instance requests. Engage with Liferay support or security advisories to obtain patches or updates addressing CVE-2025-62241 as soon as they become available. In the interim, consider disabling or restricting the CommerceOrderPortlet if feasible, or implement custom validation to enforce instance boundaries on commerceOrderId parameters. Conduct thorough audits of user roles and permissions to minimize the number of users with access to shipment data. Additionally, educate users about the risks of credential compromise and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Finally, ensure incident response plans include procedures for potential data leakage scenarios involving shipment information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-10-09T20:58:49.217Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ed566e06a2a330d3233343

Added to database: 10/13/2025, 7:43:42 PM

Last enriched: 10/13/2025, 7:50:05 PM

Last updated: 10/13/2025, 8:51:16 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats