CVE-2025-43788

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in Liferay Portal/DXP to enumerate all organizations without proper permission checks. It affects Liferay Portal 7.4.0-7.4.3.124 and Liferay DXP 2024.Q1.1-2024.Q1.12 and 7.4 update 81-85. This information disclosure could aid attackers in reconnaissance and targeted attacks.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.124; Liferay DXP 2024.Q1.1 through 2024.Q1.12 and 7.4 update 81 through update 85
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects both Portal and DXP editions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the entire organizational structure, identify high-value targets, and use this information for social engineering, privilege escalation, or targeted attacks against specific departments.

🟠

Likely Case

Malicious insiders or compromised accounts could gather organizational intelligence to plan further attacks or exfiltrate sensitive structural information.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure that doesn't directly compromise data or systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.125+, Liferay DXP 2024.Q1.13+, 7.4 update 86+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43788

Restart Required: No

Instructions:

1. Download appropriate patch from Liferay Customer Portal. 2. Apply patch using Liferay's patching tool. 3. Verify patch application in Control Panel > Server Administration > Patches.

🔧 Temporary Workarounds

Restrict Organization Access

all

Implement custom permission checks or filters to restrict organization listing

Implement custom permission checker in portal-ext.properties or via hook

Audit User Permissions

all

Review and restrict user permissions to minimize attack surface

Review User Role assignments in Control Panel > Users > Roles

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Liferay instances
  • Enable detailed logging and monitoring for organization listing activities

🔍 How to Verify

Check if Vulnerable:

Check version in Control Panel > Server Administration > Properties; verify if within affected ranges

Check Version:

Check liferay.home/portal-ext.properties or Control Panel > Server Administration

Verify Fix Applied:

Verify patch is listed in Control Panel > Server Administration > Patches and test organization listing with low-privilege user

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of organization listing requests
  • Organization enumeration from non-admin accounts

Network Indicators:

  • Patterns of sequential organization ID requests

SIEM Query:

source="liferay" AND (message="*organization*list*" OR message="*OrganizationLocalServiceUtil*" OR message="*getOrganizations*") AND user_role!="Administrator"

🔗 References

📤 Share & Export