CVE-2025-62253

6.1 MEDIUM

📋 TL;DR

This open redirect vulnerability in Liferay Portal and DXP allows attackers to redirect authenticated users to malicious external websites by manipulating the redirect parameter in page administration. It affects users with page administration access in vulnerable versions. The vulnerability enables phishing attacks and credential theft through trusted-looking redirects.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.97 and older unsupported versions; Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to have access to page administration functionality. Older unsupported versions are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect authenticated administrators to phishing sites that steal credentials, leading to full system compromise and data exfiltration.

🟠

Likely Case

Phishing attacks where users are redirected to malicious sites that mimic legitimate services to steal credentials or deliver malware.

🟢

If Mitigated

Limited impact if proper URL validation and user education about suspicious redirects are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to page administration. The vulnerability is in the redirect parameter handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.98+, Liferay DXP 2023.Q4.1+, 2023.Q3.5+, 7.4 update 93+, 7.3 update 36+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62253

Restart Required: No

Instructions:

1. Download the appropriate patch from Liferay's customer portal. 2. Apply the patch according to Liferay's patching documentation. 3. Verify the fix by testing the redirect functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement a servlet filter or security filter to validate and sanitize redirect URLs, rejecting external URLs in the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests containing external URLs in the redirect parameter.
  • Restrict access to page administration functionality to only trusted users and monitor for suspicious redirect patterns.

🔍 How to Verify

Check if Vulnerable:

Test by accessing page administration and attempting to set the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter to an external URL like https://evil.com.

Check Version:

Check Liferay version via Control Panel → Server Administration → System Information, or examine liferay-portal.xml version property.

Verify Fix Applied:

After patching, repeat the test; the system should reject external URLs or redirect to a safe internal page.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing redirects to external domains from page administration requests
  • Unusual redirect patterns in access logs

Network Indicators:

  • Outbound HTTP requests to suspicious domains following page administration access

SIEM Query:

source="liferay-logs" AND (url:*redirect* AND url:*http* AND NOT url:*liferay*)

🔗 References

📤 Share & Export