CVE-2025-62253: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
Open redirect vulnerability in page administration in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter.
AI Analysis
Technical Summary
CVE-2025-62253 is classified as a CWE-601 open redirect vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, including 7.4.0 through 7.4.3.97 and several 2023 Q3 and Q4 releases. The vulnerability resides in the page administration functionality, specifically involving the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter. An attacker can craft a URL containing this parameter to redirect users to arbitrary external websites without proper validation or sanitization by the application. This flaw can be exploited remotely without requiring any authentication or user interaction, increasing its risk profile. The vulnerability could be leveraged in phishing campaigns, where users are redirected to malicious sites that mimic legitimate services, potentially leading to credential compromise or malware infections. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on availability but a low impact on confidentiality and integrity due to redirection. No public exploits have been reported yet, but the widespread use of Liferay Portal in enterprise environments makes this a notable risk. The lack of vendor patches at the time of reporting necessitates immediate attention to mitigation strategies.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Since Liferay Portal is widely used in government, education, and enterprise sectors across Europe, attackers could exploit this flaw to redirect users to malicious websites, potentially harvesting credentials or delivering malware payloads. This could undermine user trust, lead to data breaches, and disrupt business operations. The vulnerability's ease of exploitation without authentication means attackers can target any user accessing vulnerable portals. Critical infrastructure and public sector organizations using Liferay are particularly at risk due to the potential for reputational damage and operational disruption. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of successful phishing or malware campaigns could be severe. The absence of known exploits in the wild currently limits immediate impact but does not reduce the urgency for mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all Liferay Portal and DXP instances to identify affected versions. 2) Apply vendor patches or updates as soon as they become available. 3) In the interim, implement strict input validation and sanitization on the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter to restrict redirects only to trusted internal URLs. 4) Employ web application firewalls (WAF) with rules to detect and block suspicious redirect attempts. 5) Conduct user awareness training focused on recognizing phishing attempts that may leverage this vulnerability. 6) Monitor web server logs and network traffic for unusual redirect patterns or spikes in external URL redirections. 7) Consider disabling or restricting page administration features to trusted administrators only, reducing the attack surface. 8) Collaborate with Liferay support and security teams for guidance and updates. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and operational controls relevant to Liferay deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2025-62253: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
Description
Open redirect vulnerability in page administration in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-62253 is classified as a CWE-601 open redirect vulnerability affecting multiple versions of Liferay Portal and Liferay DXP, including 7.4.0 through 7.4.3.97 and several 2023 Q3 and Q4 releases. The vulnerability resides in the page administration functionality, specifically involving the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter. An attacker can craft a URL containing this parameter to redirect users to arbitrary external websites without proper validation or sanitization by the application. This flaw can be exploited remotely without requiring any authentication or user interaction, increasing its risk profile. The vulnerability could be leveraged in phishing campaigns, where users are redirected to malicious sites that mimic legitimate services, potentially leading to credential compromise or malware infections. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on availability but a low impact on confidentiality and integrity due to redirection. No public exploits have been reported yet, but the widespread use of Liferay Portal in enterprise environments makes this a notable risk. The lack of vendor patches at the time of reporting necessitates immediate attention to mitigation strategies.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Since Liferay Portal is widely used in government, education, and enterprise sectors across Europe, attackers could exploit this flaw to redirect users to malicious websites, potentially harvesting credentials or delivering malware payloads. This could undermine user trust, lead to data breaches, and disrupt business operations. The vulnerability's ease of exploitation without authentication means attackers can target any user accessing vulnerable portals. Critical infrastructure and public sector organizations using Liferay are particularly at risk due to the potential for reputational damage and operational disruption. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of successful phishing or malware campaigns could be severe. The absence of known exploits in the wild currently limits immediate impact but does not reduce the urgency for mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all Liferay Portal and DXP instances to identify affected versions. 2) Apply vendor patches or updates as soon as they become available. 3) In the interim, implement strict input validation and sanitization on the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter to restrict redirects only to trusted internal URLs. 4) Employ web application firewalls (WAF) with rules to detect and block suspicious redirect attempts. 5) Conduct user awareness training focused on recognizing phishing attempts that may leverage this vulnerability. 6) Monitor web server logs and network traffic for unusual redirect patterns or spikes in external URL redirections. 7) Consider disabling or restricting page administration features to trusted administrators only, reducing the attack surface. 8) Collaborate with Liferay support and security teams for guidance and updates. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and operational controls relevant to Liferay deployments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-10-09T20:58:51.717Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ffc300ba6dffc5e2087c7f
Added to database: 10/27/2025, 7:07:44 PM
Last enriched: 10/27/2025, 7:22:45 PM
Last updated: 10/27/2025, 8:31:41 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12315: SQL Injection in code-projects Food Ordering System
MediumCVE-2025-12314: SQL Injection in code-projects Food Ordering System
MediumCVE-2025-12313: Command Injection in D-Link DI-7001 MINI
MediumCVE-2025-62524: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in THM-Health PILOS
MediumCVE-2025-62523: CWE-942: Permissive Cross-domain Policy with Untrusted Domains in THM-Health PILOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.