CVE-2025-43819

6.5 MEDIUM

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to reuse expired user sessions through the Single Logout (SLO) API in affected Liferay versions. Attackers can potentially hijack user sessions and gain unauthorized access to portal functionality. Organizations running vulnerable Liferay Portal or DXP installations are affected.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.3.121 through 7.3.3.131; Liferay DXP 2024.Q4.0 through 2024.Q4.3, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12
Operating Systems: All platforms running Liferay
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations using the vulnerable SLO API implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative privileges by hijacking administrator sessions, leading to complete system compromise, data theft, and unauthorized configuration changes.

🟠

Likely Case

Attackers hijack regular user sessions to access sensitive data, perform unauthorized actions, or escalate privileges within the portal.

🟢

If Mitigated

With proper session management controls and network segmentation, impact is limited to session hijacking within the portal's authorization boundaries.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the SLO API endpoint but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.122+, Liferay DXP 2024.Q4.4+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.13+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43819

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack following Liferay's deployment guide. 3. Restart the Liferay server. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable SLO API

all

Temporarily disable the Single Logout API if not required for your deployment.

Modify portal-ext.properties: session.disabled=true

Network Access Control

linux

Restrict network access to the SLO API endpoint using firewall rules.

iptables -A INPUT -p tcp --dport 8080 -m string --string "/api/jsonws/session" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict session timeout policies (e.g., 15-minute maximum session duration)
  • Deploy Web Application Firewall (WAF) with session fixation protection rules

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Check Version:

curl -s http://localhost:8080/api/jsonws/invoke?cmd=version | grep build.number

Verify Fix Applied:

Verify version is updated to patched version and test SLO API functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple SLO API requests from same IP with different session IDs
  • Session reuse patterns in authentication logs

Network Indicators:

  • Unusual SLO API traffic patterns
  • Session ID reuse in HTTP headers

SIEM Query:

source="liferay.log" AND "SingleLogoutService" AND ("session" OR "SLO")

🔗 References

📤 Share & Export