CVE-2025-4581

8.6 HIGH

📋 TL;DR

This CVE describes a pre-authentication blind Server-Side Request Forgery (SSRF) vulnerability in Liferay Portal and DXP. Attackers can force vulnerable servers to make arbitrary HTTP requests to internal systems without authentication, potentially exposing internal networks. Affected versions include Liferay Portal 7.4.0-7.4.3.132 and multiple DXP versions from 2024.Q1 through 2025.Q1.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.132; Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in portal-settings-authentication-opensso-web component. All default installations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete internal network enumeration leading to lateral movement, credential theft from internal services, and exploitation of other vulnerable internal systems.

🟠

Likely Case

Internal network scanning and service discovery, potentially exposing sensitive internal endpoints and metadata.

🟢

If Mitigated

Limited impact if proper network segmentation and egress filtering are in place, though initial reconnaissance may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill. The vulnerability is in a specific web component with predictable behavior.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.133+, Liferay DXP 2025.Q1.5+, 2024.Q4.8+, 2024.Q3.14+, 2024.Q2.14+, 2024.Q1.16+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-4581

Restart Required: Yes

Instructions:

1. Download appropriate patch from Liferay Customer Portal. 2. Apply patch following Liferay's patching procedures. 3. Restart Liferay instance. 4. Verify patch application via version check.

🔧 Temporary Workarounds

Disable OpenSSO Authentication Module

all

Remove or disable the vulnerable portal-settings-authentication-opensso-web module if not required.

Navigate to Control Panel > Apps > App Manager > Installed Apps
Find 'OpenSSO Authentication' module
Click 'Deactivate' or 'Uninstall'

Network Egress Filtering

all

Implement firewall rules to restrict outbound HTTP/HTTPS requests from Liferay servers to only necessary external services.

Configure firewall to block outbound requests from Liferay server except to whitelisted destinations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Liferay servers from sensitive internal networks.
  • Deploy web application firewall (WAF) with SSRF protection rules to block exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel > Server Administration > Properties. Look for version numbers in affected ranges.

Check Version:

Check via Liferay UI or examine liferay-portal.properties file for version information.

Verify Fix Applied:

Verify version is updated to patched versions: Portal 7.4.3.133+ or DXP versions beyond affected ranges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Liferay server to internal IP addresses
  • Requests to portal-settings-authentication-opensso-web endpoint with URL parameters

Network Indicators:

  • HTTP requests from Liferay server to unexpected internal destinations
  • Port scanning patterns originating from Liferay server

SIEM Query:

source_ip=LIFERAY_SERVER_IP AND (dest_ip=INTERNAL_RANGE OR dest_port=SCANNING_PORTS)

🔗 References

📤 Share & Export