CVE-2025-43790

8.1 HIGH

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP that allows authenticated users to access, create, edit, and relate data across different virtual instances. Attackers can manipulate object references to perform unauthorized operations on data belonging to other virtual instances. This affects Liferay Portal 7.4.0-7.4.3.124 and Liferay DXP 2024.Q2.0-2024.Q2.6, 2024.Q1.1-2024.Q1.12, and 7.4 GA through update 92.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.124; Liferay DXP 2024.Q2.0 through 2024.Q2.6, 2024.Q1.1 through 2024.Q1.12, and 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. Virtual instance isolation is broken.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of data isolation between virtual instances, allowing authenticated attackers to read, modify, delete, or create data in any virtual instance, potentially leading to data breaches, privilege escalation, or service disruption.

🟠

Likely Case

Unauthorized access to sensitive data across virtual instances, data manipulation, and potential privilege escalation within the affected Liferay deployment.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation, though the vulnerability still exists at the application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. IDOR vulnerabilities typically involve manipulating object identifiers in requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.125 or later; Liferay DXP 2024.Q2.7 or later, 2024.Q1.13 or later, or 7.4 update 93 or later

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43790

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Liferay's customer portal. 2. Apply the patch following Liferay's patching procedures. 3. Restart the Liferay server. 4. Verify the fix by testing virtual instance isolation.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Implement strict access controls and monitoring for authenticated users to limit potential exploitation.

🧯 If You Can't Patch

  • Implement network segmentation to isolate virtual instances at the network level.
  • Enhance monitoring and alerting for unusual cross-instance data access patterns.

🔍 How to Verify

Check if Vulnerable:

Check the Liferay version against affected ranges. Test if authenticated users can access data across virtual instances by manipulating object IDs.

Check Version:

Check the Liferay version in the Control Panel under Configuration > Server Administration > Properties, or via the Liferay API.

Verify Fix Applied:

After patching, verify that authenticated users can no longer access, create, edit, or relate data across different virtual instances.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns across virtual instances
  • Failed authorization attempts for cross-instance operations
  • Modifications to data in unexpected virtual instances

Network Indicators:

  • Increased authenticated requests to object endpoints with manipulated IDs

SIEM Query:

Example: 'source="liferay" AND (event_type="data_access" OR event_type="data_modification") AND virtual_instance_change="true"'

🔗 References

📤 Share & Export