CVE-2025-43763
📋 TL;DR
A server-side request forgery (SSRF) vulnerability in Liferay Portal and DXP allows attackers to manipulate custom object attachment fields to make unauthorized requests to other systems. This affects Liferay Portal 7.4.0-7.4.3.131 and multiple DXP versions from 2024.Q1.1 through 2024.Q4.7. Attackers can create object entries linking to external resources they control.
💻 Affected Systems
- Liferay Portal
- Liferay DXP
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, exfiltrate sensitive data, or pivot to attack other systems within the network.
Likely Case
Unauthorized access to internal HTTP services, potential data leakage from internal endpoints, and creation of malicious object entries.
If Mitigated
Limited impact with proper network segmentation and egress filtering preventing external requests.
🎯 Exploit Status
Requires authenticated user access to exploit custom object attachment fields.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Liferay Portal 7.4.3.132+; Liferay DXP 2024.Q4.8+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.21+
Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43763
Restart Required: No
Instructions:
1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack following Liferay's deployment procedures. 3. Verify the patch was applied successfully.
🔧 Temporary Workarounds
Disable custom object attachment fields
allTemporarily disable the vulnerable custom object attachment fields functionality until patching is complete.
Implement network egress filtering
allRestrict outbound HTTP/HTTPS requests from Liferay servers to only necessary external services.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Liferay instances from sensitive internal services.
- Deploy web application firewall (WAF) rules to detect and block SSRF patterns in requests.
🔍 How to Verify
Check if Vulnerable:
Check Liferay version via Control Panel → Configuration → Server Administration → System Information.
Check Version:
Check via Liferay Control Panel or examine liferay-portal.properties file.
Verify Fix Applied:
Verify version is updated to patched version and test custom object attachment fields functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from Liferay server
- Suspicious custom object creation with external URLs
Network Indicators:
- HTTP requests from Liferay server to unexpected internal/external endpoints
- Pattern of requests to internal services from Liferay
SIEM Query:
source="liferay" AND (url="*://internal*" OR url="*://192.168.*" OR url="*://10.*" OR url="*://172.16-31.*")