Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62253: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal

0
Medium
VulnerabilityCVE-2025-62253cvecve-2025-62253cwe-601
Published: Mon Oct 27 2025 (10/27/2025, 18:54:47 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Open redirect vulnerability in page administration in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter.

AI-Powered Analysis

AILast updated: 10/27/2025, 19:22:45 UTC

Technical Analysis

CVE-2025-62253 is classified as a CWE-601 open redirect vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, including 7.4.0 through 7.4.3.97 and several 2023 Q3 and Q4 releases. The vulnerability resides in the page administration functionality, specifically involving the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter. An attacker can craft a URL containing this parameter to redirect users to arbitrary external websites without proper validation or sanitization by the application. This flaw can be exploited remotely without requiring any authentication or user interaction, increasing its risk profile. The vulnerability could be leveraged in phishing campaigns, where users are redirected to malicious sites that mimic legitimate services, potentially leading to credential compromise or malware infections. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on availability but a low impact on confidentiality and integrity due to redirection. No public exploits have been reported yet, but the widespread use of Liferay Portal in enterprise environments makes this a notable risk. The lack of vendor patches at the time of reporting necessitates immediate attention to mitigation strategies.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Since Liferay Portal is widely used in government, education, and enterprise sectors across Europe, attackers could exploit this flaw to redirect users to malicious websites, potentially harvesting credentials or delivering malware payloads. This could undermine user trust, lead to data breaches, and disrupt business operations. The vulnerability's ease of exploitation without authentication means attackers can target any user accessing vulnerable portals. Critical infrastructure and public sector organizations using Liferay are particularly at risk due to the potential for reputational damage and operational disruption. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of successful phishing or malware campaigns could be severe. The absence of known exploits in the wild currently limits immediate impact but does not reduce the urgency for mitigation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit all Liferay Portal and DXP instances to identify affected versions. 2) Apply vendor patches or updates as soon as they become available. 3) In the interim, implement strict input validation and sanitization on the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter to restrict redirects only to trusted internal URLs. 4) Employ web application firewalls (WAF) with rules to detect and block suspicious redirect attempts. 5) Conduct user awareness training focused on recognizing phishing attempts that may leverage this vulnerability. 6) Monitor web server logs and network traffic for unusual redirect patterns or spikes in external URL redirections. 7) Consider disabling or restricting page administration features to trusted administrators only, reducing the attack surface. 8) Collaborate with Liferay support and security teams for guidance and updates. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and operational controls relevant to Liferay deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-10-09T20:58:51.717Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffc300ba6dffc5e2087c7f

Added to database: 10/27/2025, 7:07:44 PM

Last enriched: 10/27/2025, 7:22:45 PM

Last updated: 10/27/2025, 8:31:41 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats