CVE-2025-62276: CWE-525: Use of Web Browser Cache Containing Sensitive Information in Liferay Portal
The Document Library and the Adaptive Media modules in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions uses an incorrect cache-control header, which allows local users to obtain access to downloaded files via the browser's cache.
AI Analysis
Technical Summary
CVE-2025-62276 is a vulnerability identified in Liferay Portal and Liferay DXP products affecting versions 7.4.0 through 7.4.3.111 and several quarterly releases of DXP in 2023. The root cause is the use of incorrect cache-control HTTP headers in the Document Library and Adaptive Media modules, which govern how downloaded files are cached by web browsers. Instead of preventing sensitive files from being stored in the browser cache or ensuring they are properly expired, the headers allow these files to remain accessible locally after download. This flaw enables local users on the same machine to retrieve sensitive documents from the browser cache without requiring authentication or elevated privileges. The vulnerability is classified under CWE-525, which relates to the use of web browser cache containing sensitive information. The CVSS 4.0 score of 4.6 reflects a medium severity, considering the attack vector is local (AV:L), no privileges are required (PR:N), but user interaction is necessary (UI:A). The impact primarily concerns confidentiality, as unauthorized local users can access sensitive cached files, potentially leading to data leakage. There are no known exploits in the wild, and no patches have been linked yet, indicating that mitigation may currently rely on configuration changes or updates once available. This vulnerability affects multiple versions, including unsupported older releases, increasing the risk for organizations that have not maintained up-to-date Liferay installations.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive data exposure through local access to cached files in web browsers. Organizations using Liferay Portal or DXP for document management or media delivery may inadvertently expose confidential documents to unauthorized local users, such as employees sharing workstations or in environments where endpoint security is weak. The impact is particularly significant for sectors handling sensitive personal data (e.g., GDPR-regulated data), intellectual property, or confidential business information. While remote exploitation is not feasible, insider threats or compromised endpoints could leverage this vulnerability to extract sensitive information. This could lead to compliance violations, reputational damage, and potential financial penalties under European data protection laws. The lack of authentication requirements and the persistence of cached files increase the window of exposure. Organizations with shared workstations, remote desktop environments, or insufficient endpoint controls are at heightened risk.
Mitigation Recommendations
European organizations should immediately audit their Liferay Portal and DXP deployments to identify affected versions. Until official patches are released, administrators should consider disabling or restricting access to the Document Library and Adaptive Media modules for untrusted users. Implementing strict endpoint security controls, such as user session isolation, clearing browser caches regularly, and enforcing browser policies to limit caching of sensitive content, can reduce risk. Educate users about the risks of leaving sensitive files in browser caches, especially on shared or public machines. Monitoring local systems for unauthorized access to browser cache directories may help detect exploitation attempts. Once patches or updates are available from Liferay, prioritize their deployment. Additionally, review HTTP response headers related to cache-control in the affected modules and customize them to prevent caching of sensitive files if possible. Employ endpoint encryption and access controls to further protect cached data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-62276: CWE-525: Use of Web Browser Cache Containing Sensitive Information in Liferay Portal
Description
The Document Library and the Adaptive Media modules in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions uses an incorrect cache-control header, which allows local users to obtain access to downloaded files via the browser's cache.
AI-Powered Analysis
Technical Analysis
CVE-2025-62276 is a vulnerability identified in Liferay Portal and Liferay DXP products affecting versions 7.4.0 through 7.4.3.111 and several quarterly releases of DXP in 2023. The root cause is the use of incorrect cache-control HTTP headers in the Document Library and Adaptive Media modules, which govern how downloaded files are cached by web browsers. Instead of preventing sensitive files from being stored in the browser cache or ensuring they are properly expired, the headers allow these files to remain accessible locally after download. This flaw enables local users on the same machine to retrieve sensitive documents from the browser cache without requiring authentication or elevated privileges. The vulnerability is classified under CWE-525, which relates to the use of web browser cache containing sensitive information. The CVSS 4.0 score of 4.6 reflects a medium severity, considering the attack vector is local (AV:L), no privileges are required (PR:N), but user interaction is necessary (UI:A). The impact primarily concerns confidentiality, as unauthorized local users can access sensitive cached files, potentially leading to data leakage. There are no known exploits in the wild, and no patches have been linked yet, indicating that mitigation may currently rely on configuration changes or updates once available. This vulnerability affects multiple versions, including unsupported older releases, increasing the risk for organizations that have not maintained up-to-date Liferay installations.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive data exposure through local access to cached files in web browsers. Organizations using Liferay Portal or DXP for document management or media delivery may inadvertently expose confidential documents to unauthorized local users, such as employees sharing workstations or in environments where endpoint security is weak. The impact is particularly significant for sectors handling sensitive personal data (e.g., GDPR-regulated data), intellectual property, or confidential business information. While remote exploitation is not feasible, insider threats or compromised endpoints could leverage this vulnerability to extract sensitive information. This could lead to compliance violations, reputational damage, and potential financial penalties under European data protection laws. The lack of authentication requirements and the persistence of cached files increase the window of exposure. Organizations with shared workstations, remote desktop environments, or insufficient endpoint controls are at heightened risk.
Mitigation Recommendations
European organizations should immediately audit their Liferay Portal and DXP deployments to identify affected versions. Until official patches are released, administrators should consider disabling or restricting access to the Document Library and Adaptive Media modules for untrusted users. Implementing strict endpoint security controls, such as user session isolation, clearing browser caches regularly, and enforcing browser policies to limit caching of sensitive content, can reduce risk. Educate users about the risks of leaving sensitive files in browser caches, especially on shared or public machines. Monitoring local systems for unauthorized access to browser cache directories may help detect exploitation attempts. Once patches or updates are available from Liferay, prioritize their deployment. Additionally, review HTTP response headers related to cache-control in the affected modules and customize them to prevent caching of sensitive files if possible. Employ endpoint encryption and access controls to further protect cached data.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Liferay
- Date Reserved
- 2025-10-09T20:58:54.403Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6905491afb7fda9fbd25249b
Added to database: 10/31/2025, 11:41:14 PM
Last enriched: 11/8/2025, 2:42:56 AM
Last updated: 12/16/2025, 8:03:50 PM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8872: CWE-400 Uncontrolled Resource Consumption in Arista Networks EOS
HighCVE-2025-68142: CWE-1333: Inefficient Regular Expression Complexity in facelessuser pymdown-extensions
LowCVE-2025-65589: n/a
UnknownCVE-2025-65581: n/a
MediumCVE-2025-52196: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.