CVE-2025-62242: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
Insecure Direct Object Reference (IDOR) vulnerability with account addresses in Liferay Portal 7.4.3.4 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 GA through update 92 allows remote authenticated users to from one account to view addresses from a different account via the _com_liferay_account_admin_web_internal_portlet_AccountEntriesAdminPortlet_addressId parameter.
AI Analysis
Technical Summary
CVE-2025-62242 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Liferay Portal and Liferay DXP products. The flaw exists in the handling of the _com_liferay_account_admin_web_internal_portlet_AccountEntriesAdminPortlet_addressId parameter, which is used to reference account addresses. Due to insufficient authorization checks, a remote authenticated user can manipulate this parameter to view address data belonging to other accounts, violating access control policies. The vulnerability affects multiple versions of Liferay Portal 7.4.3.x and Liferay DXP 2023 Q3 and Q4 releases, indicating a broad impact across recent product versions. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no additional privileges beyond authentication (PR:L), and no user interaction (UI:N). The impact is limited to confidentiality (VC:L) with no integrity or availability impact. No public exploits have been reported, but the vulnerability could be leveraged to harvest sensitive address information, potentially leading to privacy violations or aiding further targeted attacks. The lack of patches at the time of publication necessitates immediate attention to access controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive customer or partner address information stored within Liferay Portal or DXP environments. Such data leaks can lead to privacy breaches, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. Organizations in sectors like finance, healthcare, government, and telecommunications that rely on Liferay for customer or account management are particularly vulnerable. The breach of address data could facilitate social engineering, identity theft, or targeted phishing attacks. Although the vulnerability does not affect system integrity or availability, the confidentiality impact alone is significant given the sensitivity of personal address data. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or insider threats.
Mitigation Recommendations
1. Apply vendor patches immediately once available to ensure the vulnerability is fully remediated. 2. Until patches are released, implement strict server-side authorization checks on the addressId parameter to verify that the requesting user has permission to access the referenced account address. 3. Conduct thorough access control reviews and audits of Liferay Portal and DXP configurations to identify and close any similar authorization gaps. 4. Monitor logs for unusual or unauthorized access patterns to account address data, focusing on parameter manipulation attempts. 5. Enforce strong authentication mechanisms and consider multi-factor authentication to reduce risk from compromised credentials. 6. Limit the exposure of the AccountEntriesAdminPortlet to trusted internal networks or VPNs where feasible. 7. Educate administrators and users about the risks of sharing credentials and the importance of reporting suspicious activity. 8. Regularly review and update security policies related to user access and data privacy compliance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-62242: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
Description
Insecure Direct Object Reference (IDOR) vulnerability with account addresses in Liferay Portal 7.4.3.4 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 GA through update 92 allows remote authenticated users to from one account to view addresses from a different account via the _com_liferay_account_admin_web_internal_portlet_AccountEntriesAdminPortlet_addressId parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-62242 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Liferay Portal and Liferay DXP products. The flaw exists in the handling of the _com_liferay_account_admin_web_internal_portlet_AccountEntriesAdminPortlet_addressId parameter, which is used to reference account addresses. Due to insufficient authorization checks, a remote authenticated user can manipulate this parameter to view address data belonging to other accounts, violating access control policies. The vulnerability affects multiple versions of Liferay Portal 7.4.3.x and Liferay DXP 2023 Q3 and Q4 releases, indicating a broad impact across recent product versions. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no additional privileges beyond authentication (PR:L), and no user interaction (UI:N). The impact is limited to confidentiality (VC:L) with no integrity or availability impact. No public exploits have been reported, but the vulnerability could be leveraged to harvest sensitive address information, potentially leading to privacy violations or aiding further targeted attacks. The lack of patches at the time of publication necessitates immediate attention to access controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive customer or partner address information stored within Liferay Portal or DXP environments. Such data leaks can lead to privacy breaches, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. Organizations in sectors like finance, healthcare, government, and telecommunications that rely on Liferay for customer or account management are particularly vulnerable. The breach of address data could facilitate social engineering, identity theft, or targeted phishing attacks. Although the vulnerability does not affect system integrity or availability, the confidentiality impact alone is significant given the sensitivity of personal address data. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or insider threats.
Mitigation Recommendations
1. Apply vendor patches immediately once available to ensure the vulnerability is fully remediated. 2. Until patches are released, implement strict server-side authorization checks on the addressId parameter to verify that the requesting user has permission to access the referenced account address. 3. Conduct thorough access control reviews and audits of Liferay Portal and DXP configurations to identify and close any similar authorization gaps. 4. Monitor logs for unusual or unauthorized access patterns to account address data, focusing on parameter manipulation attempts. 5. Enforce strong authentication mechanisms and consider multi-factor authentication to reduce risk from compromised credentials. 6. Limit the exposure of the AccountEntriesAdminPortlet to trusted internal networks or VPNs where feasible. 7. Educate administrators and users about the risks of sharing credentials and the importance of reporting suspicious activity. 8. Regularly review and update security policies related to user access and data privacy compliance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-10-09T20:58:49.217Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ed57c406a2a330d326046c
Added to database: 10/13/2025, 7:49:24 PM
Last enriched: 10/13/2025, 7:49:38 PM
Last updated: 10/13/2025, 8:51:18 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62364: CWE-59: Improper Link Resolution Before File Access ('Link Following') in oobabooga text-generation-webui
MediumCVE-2025-62246: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2024-38002: CWE-862 Missing Authorization in Liferay Portal
CriticalCVE-2025-62241: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay DXP
MediumCVE-2025-61775: CWE-613: Insufficient Session Expiration in Whimsies-YAT Vickey
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.