CVE-2025-43827

4.3 MEDIUM

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP that allows authenticated users from one virtual instance to view audit events from different virtual instances. Attackers can exploit this by manipulating the auditEventId parameter to access audit logs they shouldn't have permission to view. This affects multiple versions of Liferay Portal and DXP across various release channels.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.117 and older unsupported versions; Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92 and older unsupported versions
Operating Systems: All operating systems running affected Liferay versions
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability affects the default configuration and requires virtual instance deployment with multiple instances. Single-instance deployments are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could access sensitive audit logs from other virtual instances, potentially revealing user activities, administrative actions, or other confidential audit trail data across organizational boundaries.

🟠

Likely Case

Authenticated users with malicious intent could view audit events from other departments or business units within the same Liferay deployment, violating data segregation and potentially exposing sensitive operational information.

🟢

If Mitigated

With proper access controls and virtual instance isolation, the impact is limited to viewing audit logs that should already be properly secured and contain minimal sensitive data.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing Liferay instances could be targeted by attackers who obtain valid credentials through other means.
🏢 Internal Only: MEDIUM - Internal attackers with legitimate access could abuse this vulnerability to view audit logs from other departments or business units they shouldn't have access to.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of valid audit event IDs from other virtual instances. Attackers need to understand Liferay's virtual instance architecture and parameter structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.118+; Liferay DXP 2024.Q1.6+, 2023.Q4.11+, 2023.Q3.11+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43827

Restart Required: No

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack according to Liferay's deployment documentation. 3. Verify the fix by testing audit event access across virtual instances.

🔧 Temporary Workarounds

Virtual Instance Access Restriction

all

Implement additional access controls at the network or application level to restrict users to their assigned virtual instances only.

Audit Portlet Disablement

all

Temporarily disable the audit portlet for non-administrative users if audit functionality is not critical for their roles.

🧯 If You Can't Patch

  • Implement strict network segmentation between virtual instances to prevent cross-instance access
  • Add application-level validation to verify users belong to the virtual instance they're attempting to access audit events from

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users from one virtual instance can access audit events from another virtual instance by manipulating the _com_liferay_portal_security_audit_web_portlet_AuditPortlet_auditEventId parameter.

Check Version:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Verify Fix Applied:

After patching, attempt the same cross-virtual instance audit event access test; it should fail with proper access denied errors.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed audit event access attempts from same user across different virtual instances
  • Successful audit event access logs showing cross-virtual instance access patterns

Network Indicators:

  • Unusual patterns of audit-related API calls from users accessing multiple virtual instance endpoints

SIEM Query:

source="liferay" AND (event_type="audit_access" OR event_type="security_event") AND (virtual_instance_changes OR cross_instance_access)

🔗 References

📤 Share & Export