CVE-2025-43793

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers who control a website sharing the same top-level domain (TLD) to read cookies set by Liferay applications. It affects Liferay Portal and DXP versions through improper subdomain identification, potentially exposing session data and authentication tokens. Organizations using affected Liferay versions are at risk.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.105 and older unsupported versions; Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, impersonate legitimate users, access sensitive data, and perform unauthorized actions within the Liferay application.

🟠

Likely Case

Session hijacking and unauthorized access to user accounts and sensitive information stored in the Liferay portal.

🟢

If Mitigated

Limited exposure if proper cookie security flags are enforced and subdomain isolation is maintained.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires attacker control of a website sharing the same TLD, but no authentication to the target Liferay instance is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.106+, Liferay DXP 2023.Q4.1+, 2023.Q3.5+, 7.4 update 93+, 7.3 update 36+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43793

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Backup your current installation. 3. Apply the fix pack following Liferay's patch installation guide. 4. Restart the Liferay server. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Cookie Security Hardening

all

Configure cookies with SameSite=Strict and Secure flags to limit cross-domain access

Set portal-ext.properties: session.cookie.same.site=Strict
Set session.cookie.http.only=true
Set session.cookie.secure=true

🧯 If You Can't Patch

  • Isolate Liferay deployment to dedicated domain not shared with other applications
  • Implement web application firewall rules to detect and block cookie manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Check Version:

Check liferay.home/portal-ext.properties or Control Panel system information

Verify Fix Applied:

Verify version is updated to patched version and test cookie behavior across subdomains

📡 Detection & Monitoring

Log Indicators:

  • Unusual cookie access patterns
  • Cross-domain authentication attempts
  • Session anomalies

Network Indicators:

  • Cookie manipulation requests
  • Cross-domain cookie transfers

SIEM Query:

source="liferay-logs" AND (event="cookie_access" OR event="session_hijack")

🔗 References

📤 Share & Export