CVE-2025-43805

5.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to view display page templates in Liferay Portal/DXP without proper authorization checks. Attackers can exploit this by crafting specific URLs to access templates they shouldn't have permission to view. Affected systems include Liferay Portal 7.3.0-7.4.3.111 and Liferay DXP 2023.Q4.0, 2023.Q3.1-2023.Q3.4, 7.4 GA-update 92, and 7.3 GA-update 35.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.3.0 through 7.4.3.111; Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations within affected version ranges are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive display page templates containing configuration data, business logic details, or proprietary template designs, potentially enabling further attacks or intellectual property theft.

🟠

Likely Case

Unauthorized viewing of display page templates, which may reveal internal structure, custom configurations, or template metadata that could aid in reconnaissance for other attacks.

🟢

If Mitigated

Limited exposure of non-sensitive template information with minimal operational impact if proper network segmentation and access controls are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires crafting specific URLs but does not require authentication. Attackers need to know or guess template identifiers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.112+, Liferay DXP 2023.Q4.1+, 2023.Q3.5+, 7.4 update 93+, 7.3 update 36+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43805

Restart Required: No

Instructions:

1. Backup your Liferay instance. 2. Apply the appropriate patch from Liferay's customer portal. 3. Verify the patch was applied successfully. 4. Test functionality to ensure no regression.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to Liferay administration interfaces and template management URLs to authorized users only using network controls.

Web Application Firewall Rules

all

Implement WAF rules to block requests to display page template endpoints from unauthorized sources.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to Liferay instances
  • Monitor access logs for unusual template viewing patterns and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check your Liferay version against affected ranges. Attempt to access display page templates via crafted URLs without proper permissions.

Check Version:

Check Liferay Control Panel → Server Administration → Properties → liferay.version

Verify Fix Applied:

After patching, verify the version is updated and test that unauthorized users cannot access display page templates via URL manipulation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to display page template endpoints
  • Failed authorization attempts followed by successful template access

Network Indicators:

  • HTTP requests to template endpoints from unexpected sources
  • Patterns of URL manipulation attempts

SIEM Query:

source="liferay-logs" AND (uri CONTAINS "/display-page-template" OR uri CONTAINS "/template/") AND response_code=200 AND user_role!="admin"

🔗 References

📤 Share & Export