CVE-2025-43824

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users to manipulate file extensions when downloading vCard files from the Profile widget in Liferay. Attackers could potentially deliver malicious files disguised as legitimate vCards. Affected systems include Liferay Portal 7.4.0-7.4.3.111 and Liferay DXP 2023.Q4.0-2023.Q4.5, 2023.Q3.1-2023.Q3.8, and 7.4 GA through update 92.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.111; Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Older unsupported versions are also affected. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could deliver executable malware disguised as a vCard file, potentially leading to system compromise if users execute the malicious file.

🟠

Likely Case

Attackers could deliver phishing payloads or other malicious files with misleading extensions, increasing the success rate of social engineering attacks.

🟢

If Mitigated

With proper user training and endpoint protection, the impact is limited to potential confusion about file types.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and user interaction (downloading/executing the file).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.112+, Liferay DXP 2023.Q4.6+, 2023.Q3.9+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43824

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack following Liferay's update procedures. 3. Restart the Liferay instance.

🔧 Temporary Workarounds

Disable Profile widget vCard download

all

Remove or disable the Profile widget functionality that allows vCard downloads

Navigate to Control Panel > Widgets > Profile widget configuration
Disable vCard download option if available

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious Content-Disposition header manipulation
  • Educate users about the risks of downloading files from the Profile widget and verify file extensions before opening

🔍 How to Verify

Check if Vulnerable:

Check Liferay version against affected ranges. Test by downloading a vCard from Profile widget and inspecting Content-Disposition header.

Check Version:

Check Liferay build number in Control Panel > Server Administration > Properties

Verify Fix Applied:

After patching, verify the Content-Disposition header no longer contains user-controlled file extension parameters.

📡 Detection & Monitoring

Log Indicators:

  • Unusual vCard download patterns
  • Multiple failed download attempts with manipulated parameters

Network Indicators:

  • HTTP requests with manipulated Content-Disposition headers
  • Unusual file downloads from Profile widget endpoints

SIEM Query:

web_server_logs WHERE uri CONTAINS '/profile/vcard/download' AND (user_agent IS suspicious OR parameters CONTAINS 'extension')

🔗 References

📤 Share & Export