Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62244: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal

0
Medium
VulnerabilityCVE-2025-62244cvecve-2025-62244cwe-639
Published: Mon Oct 13 2025 (10/13/2025, 16:53:35 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Insecure direct object reference (IDOR) vulnerability in Publications in Liferay Portal 7.3.1 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 GA through update 92, and 7.3 GA through update 36 allows remote authenticated attackers to view the edit page of a publication via the _com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId parameter.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:43:02 UTC

Technical Analysis

CVE-2025-62244 is an insecure direct object reference (IDOR) vulnerability categorized under CWE-639, affecting Liferay Portal versions 7.3.1 through 7.4.3.111 and multiple Liferay DXP 2023 releases. The vulnerability arises from improper authorization checks on the _com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId parameter, which is user-controlled. An authenticated attacker can manipulate this parameter to bypass authorization controls and access the edit page of publications they should not be permitted to modify. This flaw allows unauthorized viewing and potentially unauthorized editing of publication content within the portal. The vulnerability requires the attacker to have valid user credentials and some level of user interaction, but no elevated privileges are necessary. The CVSS 4.8 score reflects a medium severity, considering the network attack vector, low complexity, no requirement for privileges beyond authentication, and limited impact on confidentiality and integrity. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The issue affects a broad range of Liferay Portal and DXP versions, indicating a widespread potential impact for organizations using these products. The vulnerability could lead to unauthorized content manipulation, information disclosure, and potential reputational damage if exploited.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to sensitive publication editing interfaces within Liferay Portal and DXP environments. Organizations relying on Liferay for content management, especially in sectors such as government, education, and large enterprises, could see unauthorized users viewing or modifying publication content. This could lead to misinformation, data integrity issues, and potential compliance violations under regulations like GDPR if sensitive information is exposed or altered. The requirement for authentication limits the attack surface to insiders or compromised accounts, but the ease of exploitation through a user-controlled parameter increases risk. Availability is not directly impacted, but integrity and confidentiality could be compromised. The medium severity suggests a moderate risk that should not be ignored, especially in environments with high-value or sensitive content. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

1. Monitor Liferay vendor communications closely for official patches addressing CVE-2025-62244 and apply them promptly upon release. 2. Implement strict access controls and role-based permissions to limit which authenticated users can access publication editing features. 3. Conduct regular audits of user permissions and review logs for unusual access patterns to publication edit pages. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious manipulation of the _com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId parameter. 5. Educate users on the importance of account security to prevent credential compromise, as exploitation requires authentication. 6. Consider additional application-layer authorization checks or custom validation on user-controlled parameters if immediate patching is not feasible. 7. Isolate critical content management systems from general user networks where possible to reduce exposure. 8. Engage in penetration testing focused on IDOR vulnerabilities to identify similar weaknesses in the environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-10-09T20:58:49.217Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ed375065e259ed7ed7d000

Added to database: 10/13/2025, 5:30:56 PM

Last enriched: 10/21/2025, 12:43:02 AM

Last updated: 12/4/2025, 9:35:37 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats