CVE-2025-43808

5.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to access and download virtual products for free in Liferay Commerce by exploiting incorrect permission settings on uploaded files. Attackers can use crafted URLs to bypass payment requirements. Affected systems include Liferay Portal 7.3.0-7.4.3.112 and Liferay DXP multiple versions from 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and 7.3 service pack 3 through update 35.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.3.0 through 7.4.3.112; Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, 7.3 service pack 3 through update 35
Operating Systems: All platforms running affected Liferay versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Commerce component with virtual products uploaded to Documents and Media.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of revenue from virtual product sales as all customers download products without payment, potential data exposure if virtual products contain sensitive information.

🟠

Likely Case

Unauthorized users download virtual products without payment, causing direct revenue loss for affected products.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place to detect unauthorized downloads.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication via crafted URLs.
🏢 Internal Only: MEDIUM - Internal users could exploit but external threat is more significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of virtual product URLs but is straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.113+, Liferay DXP 2023.Q4.9+, 2023.Q3.11+, 7.4 update 93+, 7.3 update 36+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43808

Restart Required: No

Instructions:

1. Apply the appropriate patch version for your Liferay installation. 2. Verify the patch is applied correctly. 3. Test virtual product downloads to ensure proper permission enforcement.

🔧 Temporary Workarounds

Manual Permission Adjustment

all

Manually adjust permissions on Documents and Media folders containing virtual products to remove guest view access.

Navigate to Control Panel > Documents and Media > select folder > Permissions > remove Guest view permission

Access Control via Web Server

all

Configure web server (Apache/Nginx) to block direct access to virtual product URLs for unauthenticated users.

Add URL filtering rules in web server configuration to require authentication for /documents/d/ paths

🧯 If You Can't Patch

  • Implement strict access controls on Documents and Media folders containing virtual products
  • Monitor download logs for unauthorized access patterns and implement alerting

🔍 How to Verify

Check if Vulnerable:

Test if virtual products can be downloaded without authentication using direct URLs. Check Liferay version against affected ranges.

Check Version:

Check Liferay version via Control Panel > Server Administration > Properties or via server logs

Verify Fix Applied:

Verify virtual products require proper authentication after patch. Confirm version is updated to patched version.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /documents/d/ paths
  • Guest user downloads of virtual product files
  • High volume of downloads from unauthenticated IPs

Network Indicators:

  • Unusual download patterns for virtual product files
  • Direct URL access attempts without authentication headers

SIEM Query:

source="liferay.log" AND ("Guest" OR "anonymous") AND ("/documents/d/" OR "virtual product") AND ("download" OR "access")

🔗 References

📤 Share & Export