Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62261: CWE-312 Cleartext Storage of Sensitive Information in Liferay Portal

0
Medium
VulnerabilityCVE-2025-62261cvecve-2025-62261cwe-312
Published: Mon Oct 27 2025 (10/27/2025, 21:11:46 UTC)
Source: CVE Database V5
Vendor/Project: Liferay
Product: Portal

Description

Liferay Portal 7.4.0 through 7.4.3.99, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 34, and older unsupported versions stores password reset tokens in plain text, which allows attackers with access to the database to obtain the token, reset a user’s password and take over the user’s account.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:27:38 UTC

Technical Analysis

CVE-2025-62261 is a security vulnerability identified in Liferay Portal and Liferay DXP products, specifically affecting versions 7.4.0 through 7.4.3.99 and several older unsupported versions. The core issue is the cleartext storage of password reset tokens in the database, violating secure storage best practices (CWE-312). Password reset tokens are sensitive credentials that allow users to reset their account passwords. By storing these tokens in plaintext, the system exposes them to anyone with direct database access. An attacker who gains such access can retrieve these tokens, use them to reset user passwords, and effectively take over user accounts without needing to authenticate or interact with the user. The vulnerability has a CVSS 4.0 score of 6.9, reflecting a medium severity level. The vector metrics indicate network attack vector (AV:N), low attack complexity (AC:L), no privileges required (AT:N) except high privileges on the database (PR:H), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. This means the main risk is unauthorized disclosure of sensitive tokens leading to account takeover. The vulnerability does not affect system integrity or availability directly but compromises user account confidentiality. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. However, the vulnerability poses a significant risk in environments where database access controls are weak or compromised. Organizations using affected Liferay versions should prioritize restricting database access, monitoring for suspicious activity, and applying updates when they become available.

Potential Impact

For European organizations, the impact of CVE-2025-62261 can be significant, especially for those relying on Liferay Portal or DXP for critical business applications, intranets, or customer-facing portals. Unauthorized access to password reset tokens can lead to account takeover, resulting in unauthorized access to sensitive corporate data, disruption of business processes, and potential data breaches. This could affect confidentiality of user accounts and potentially lead to further lateral movement within the network if compromised accounts have elevated privileges. The impact is heightened in sectors such as finance, government, healthcare, and large enterprises where Liferay is commonly deployed. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and exploitation of this vulnerability could lead to compliance violations and financial penalties. The requirement for high privileges on the database means the vulnerability is less likely to be exploited by external attackers without initial access, but insider threats or attackers who have already compromised the network could exploit it to escalate privileges and compromise user accounts.

Mitigation Recommendations

1. Restrict and tightly control database access: Ensure that only authorized personnel and applications have access to the Liferay database, using the principle of least privilege. 2. Monitor database access logs for unusual or unauthorized queries that may indicate attempts to retrieve password reset tokens. 3. Implement network segmentation and strong access controls around database servers to reduce the risk of unauthorized access. 4. Apply available patches or updates from Liferay as soon as they are released to address this vulnerability. 5. If patches are not yet available, consider implementing compensating controls such as encrypting sensitive data at rest within the database or using application-level encryption for password reset tokens. 6. Conduct regular security audits and penetration testing focused on database security and access controls. 7. Educate administrators and developers about secure handling of sensitive tokens and credentials to prevent similar issues in the future. 8. Review and harden password reset workflows to detect and prevent unauthorized resets.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Liferay
Date Reserved
2025-10-09T20:58:53.011Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffe2a8ba6dffc5e210be3e

Added to database: 10/27/2025, 9:22:48 PM

Last enriched: 11/4/2025, 3:27:38 AM

Last updated: 12/11/2025, 8:47:12 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats