CVE-2025-43810

4.3 MEDIUM

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP allows authenticated users from one virtual instance to add notes to commerce orders in different virtual instances by manipulating the commerceOrderId parameter. This affects Liferay Portal 7.3.5-7.4.3.112 and Liferay DXP 2023.Q4.0-2023.Q4.8, 2023.Q3.1-2023.Q3.10, and 7.4 GA-update 92.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.3.5 through 7.4.3.112; Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, and 7.4 GA through update 92
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated users with access to at least one virtual instance; affects multi-instance deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could tamper with order data across virtual instances, potentially causing business disruption, data corruption, or unauthorized order modifications.

🟠

Likely Case

Authenticated users could add unauthorized notes to orders in other virtual instances, potentially causing confusion, data integrity issues, or minor business process disruption.

🟢

If Mitigated

With proper access controls and instance isolation, impact is limited to unauthorized note additions without affecting core order functionality.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of target order IDs; parameter manipulation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.113+; Liferay DXP 2023.Q4.9+, 2023.Q3.11+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43810

Restart Required: No

Instructions:

1. Download appropriate patch from Liferay Customer Portal. 2. Apply patch following Liferay's patching procedures. 3. Verify fix by testing order note functionality across virtual instances.

🔧 Temporary Workarounds

Virtual Instance Access Restriction

all

Implement additional access controls to restrict authenticated users from accessing order management interfaces across virtual instances.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for commerce order note functionality
  • Deploy web application firewall rules to detect and block suspicious parameter manipulation

🔍 How to Verify

Check if Vulnerable:

Test if authenticated user in one virtual instance can add notes to orders in another virtual instance by manipulating commerceOrderId parameter.

Check Version:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Verify Fix Applied:

After patching, verify that cross-instance order note addition is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual order note additions from users outside expected virtual instance
  • Multiple failed attempts to access cross-instance order data

Network Indicators:

  • HTTP requests with manipulated commerceOrderId parameters crossing virtual instance boundaries

SIEM Query:

source="liferay" AND (event="order_note_added" AND user_instance!=order_instance)

🔗 References

📤 Share & Export