Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62260: CWE-400 Uncontrolled Resource Consumption in Liferay Portal

0
High
VulnerabilityCVE-2025-62260cvecve-2025-62260cwe-400
Published: Mon Oct 27 2025 (10/27/2025, 21:44:08 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Liferay Portal 7.4.0 through 7.4.3.99, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number of objects returned from Headless API requests, which allows remote attackers to perform denial-of-service (DoS) attacks on the application by executing a request that returns a large number of objects.

AI-Powered Analysis

AILast updated: 10/27/2025, 22:07:46 UTC

Technical Analysis

CVE-2025-62260 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting multiple versions of Liferay Portal and Liferay DXP, specifically versions 7.4.0 through 7.4.3.99, 7.4 GA through update 92, 7.3 GA through update 35, and certain 2023.Q3 releases. The vulnerability arises because the Headless API does not impose limits on the number of objects returned in response to a request. An attacker can exploit this by sending a request that forces the application to process and return an excessively large dataset, thereby consuming excessive CPU, memory, or other resources. This leads to a denial-of-service (DoS) condition, degrading or completely disrupting the availability of the Liferay Portal service. The attack vector is network-based (AV:N), requires low complexity (AC:L), no privileges (PR:L), no user interaction (UI:N), and no scope change (S:N). The vulnerability does not affect confidentiality or integrity but severely impacts availability (VA:H). No patches or exploits are currently publicly available, but the risk remains significant due to the widespread use of Liferay Portal in enterprise environments. The vulnerability is particularly concerning for organizations exposing their Headless API endpoints to external or untrusted networks.

Potential Impact

For European organizations, the impact of CVE-2025-62260 can be substantial, especially for those relying on Liferay Portal for critical business operations, customer-facing portals, or internal collaboration platforms. A successful DoS attack could lead to service outages, disrupting business continuity, customer access, and internal workflows. This may result in financial losses, reputational damage, and potential regulatory scrutiny under frameworks like GDPR if service availability affects data processing obligations. Organizations in sectors such as finance, government, healthcare, and telecommunications, which often use Liferay for digital services, are particularly vulnerable. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks from external threat actors. Additionally, the absence of current patches means organizations must rely on interim mitigations, increasing operational overhead and risk exposure.

Mitigation Recommendations

To mitigate CVE-2025-62260 effectively, European organizations should: 1) Immediately implement rate limiting and request throttling on the Headless API endpoints to restrict the number of objects returned per request. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block unusually large or malformed API requests. 3) Monitor API usage patterns to identify and respond to anomalous spikes indicative of exploitation attempts. 4) Restrict access to Headless APIs to trusted networks or authenticated users where possible, even though the vulnerability does not require authentication, to reduce attack surface. 5) Engage with Liferay support or community channels to obtain patches or updates as soon as they become available and plan for timely upgrades. 6) Conduct thorough testing of API endpoints to identify other potential resource exhaustion vectors. 7) Harden infrastructure by ensuring sufficient resource provisioning and failover mechanisms to mitigate impact during an attack. 8) Educate development and operations teams about this vulnerability to maintain vigilance and rapid response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-10-09T20:58:53.011Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffe9aeba6dffc5e211b781

Added to database: 10/27/2025, 9:52:46 PM

Last enriched: 10/27/2025, 10:07:46 PM

Last updated: 10/28/2025, 5:02:31 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats