CVE-2025-43762

6.5 MEDIUM

📋 TL;DR

This vulnerability in Liferay Portal and DXP allows authenticated users to upload unlimited files through forms, which are stored in the document library. This can lead to resource exhaustion and potential denial-of-service attacks by filling up storage. All organizations running affected versions of Liferay with file upload functionality enabled are at risk.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.132; Liferay DXP 2025.Q1.0 through 2025.Q1.1, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.14, and 7.4 GA through update 92
Operating Systems: All platforms running Liferay
Default Config Vulnerable: ⚠️ Yes
Notes: Requires file upload functionality to be enabled and accessible to users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through storage exhaustion, rendering the portal unusable and potentially affecting other services on the same storage infrastructure.

🟠

Likely Case

Degraded portal performance, increased storage costs, and potential service interruptions during peak usage periods.

🟢

If Mitigated

Minimal impact with proper file upload limits, monitoring, and storage quotas in place.

🌐 Internet-Facing: HIGH - Public-facing portals allow attackers to exploit this without network access.
🏢 Internal Only: MEDIUM - Internal users could still cause disruption, though attack surface is smaller.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user access but is straightforward to execute once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.133+; Liferay DXP 2025.Q1.2+, 2024.Q4.8+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.15+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43762

Restart Required: No

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack following Liferay's deployment procedures. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Implement File Upload Limits

all

Configure Liferay to limit file upload sizes and frequency through portal-ext.properties or system settings.

dl.file.max.size=10485760
dl.file.max.per.user=100

🧯 If You Can't Patch

  • Implement strict file upload quotas and monitoring at the storage layer
  • Disable file upload functionality for non-essential users and forms

🔍 How to Verify

Check if Vulnerable:

Check Liferay version in Control Panel > Configuration > Server Administration > System Information

Check Version:

Check via Liferay UI or examine liferay.home/version.txt file

Verify Fix Applied:

Verify version is updated to patched version and test file upload limits are enforced

📡 Detection & Monitoring

Log Indicators:

  • Unusually high frequency of file uploads
  • Rapid storage consumption alerts
  • Document library access patterns showing mass uploads

Network Indicators:

  • Spikes in upload traffic to /api/jsonws/dlapp/add-file-entry
  • Increased POST requests to file upload endpoints

SIEM Query:

source="liferay" AND (message="*add-file-entry*" OR message="*upload*") | stats count by src_ip, user

🔗 References

📤 Share & Export