CVE-2025-2565

4.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized users to access form entry data in affected Liferay versions. It affects Liferay Portal 7.4.0-7.4.3.126 and multiple Liferay DXP versions from 7.4 GA through 2024.Q3.0. Organizations using these versions without proper access controls are at risk of data exposure.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.126; Liferay DXP 2024.Q3.0, 2024.Q2.0 through 2024.Q2.12, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92
Operating Systems: All supported OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version ranges are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive form data (including potentially PII, credentials, or confidential information) could be exposed to unauthorized users, leading to data breaches and regulatory violations.

🟠

Likely Case

Unauthorized users can access form submissions that should be restricted, potentially exposing business data or user information.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users only accessing their permitted data.

🌐 Internet-Facing: HIGH - Internet-facing Liferay instances allow any unauthenticated user to potentially access form data.
🏢 Internal Only: MEDIUM - Internal users could still access unauthorized data, but attack surface is reduced compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthorized access is possible, suggesting low complexity exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.127+; Liferay DXP 2024.Q3.1+, 2024.Q2.13+, 2024.Q1.13+, 2023.Q4.11+, 2023.Q3.11+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2025-2565

Restart Required: Yes

Instructions:

1. Download appropriate fix pack from Liferay Customer Portal. 2. Backup current installation. 3. Apply fix pack following Liferay documentation. 4. Restart Liferay server. 5. Verify version update.

🔧 Temporary Workarounds

Restrict Form Access

all

Configure form permissions to restrict access to authorized users only

Network Access Controls

all

Implement network-level restrictions to limit access to Liferay forms

🧯 If You Can't Patch

  • Implement strict access controls on all forms and form data
  • Monitor access logs for unauthorized form data access attempts

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Check Version:

Check via Liferay Control Panel or examine liferay-portal.xml version property

Verify Fix Applied:

Verify version is updated to patched version and test form access with unauthorized user

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to form data endpoints
  • Unexpected form data retrieval by unauthenticated users

Network Indicators:

  • Unusual traffic patterns to form submission endpoints
  • Requests to form data APIs without authentication

SIEM Query:

source="liferay.log" AND ("FormData" OR "form entry") AND user="anonymous"

🔗 References

📤 Share & Export