CVE-2025-43745

6.5 MEDIUM

📋 TL;DR

This CSRF vulnerability in Liferay Portal and DXP allows remote attackers to perform unauthorized actions on behalf of authenticated users by exploiting the endpoint parameter. Attackers can trick users into submitting malicious requests that execute actions with the user's privileges. All organizations running affected Liferay versions are vulnerable.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.132; Liferay DXP 2025.Q2.0 through 2025.Q2.7, 2025.Q1.0 through 2025.Q1.14, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19, and 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires an authenticated user session to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could perform administrative actions like creating new admin accounts, modifying content, changing configurations, or accessing sensitive data through authenticated user sessions.

🟠

Likely Case

Attackers would typically perform actions like content manipulation, user account modifications, or data extraction by tricking authenticated users into visiting malicious pages.

🟢

If Mitigated

With proper CSRF protections and security headers, the vulnerability would be blocked, preventing unauthorized cross-origin requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users into visiting malicious pages. The attacker needs to know or guess valid endpoint parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.133+; Liferay DXP 2025.Q2.8+, 2025.Q1.15+, 2024.Q4.8+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.20+, and 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43745

Restart Required: No

Instructions:

1. Download the appropriate patch from Liferay's customer portal. 2. Apply the patch using Liferay's patching tool. 3. Verify the patch was applied successfully. 4. Test critical functionality to ensure no regression.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add SameSite cookie attributes and implement CSRF tokens to prevent cross-origin requests

Configure SameSite=Strict or Lax for session cookies
Enable CSRF token validation in Liferay configuration

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious cross-origin requests targeting Liferay endpoints
  • Restrict access to Liferay administration interfaces to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Check Version:

Check via Liferay Control Panel or examine liferay-portal.properties file

Verify Fix Applied:

Verify version is patched (7.4.3.133+ for Portal or corresponding DXP versions) and test CSRF protection by attempting cross-origin requests

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed CSRF token validations
  • Unusual endpoint parameter patterns in requests
  • Requests with missing or invalid referrer headers

Network Indicators:

  • Cross-origin requests to Liferay endpoints with suspicious parameters
  • Requests lacking CSRF tokens from external domains

SIEM Query:

source_ip!=internal_network AND destination_port=8080 AND uri_contains="/api/" AND referrer_header NOT CONTAINS "liferay-domain"

🔗 References

📤 Share & Export