CVE-2025-62276

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local users to access downloaded files via browser cache due to incorrect cache-control headers in Liferay's Document Library and Adaptive Media modules. It affects Liferay Portal 7.4.0-7.4.3.111 and Liferay DXP 2023.Q4.0-2023.Q4.10, 2023.Q3.1-2023.Q3.10, and 7.4 GA-update 92. Attackers must have local access to the user's browser.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.111; Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Older unsupported versions are also affected. Requires Document Library or Adaptive Media module usage.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers could access sensitive documents cached in browsers, potentially exposing confidential business data or personal information.

🟠

Likely Case

Users sharing computers or public workstations could inadvertently expose cached documents to subsequent users.

🟢

If Mitigated

With proper browser security settings and cache management, exposure is limited to low-sensitivity documents.

🌐 Internet-Facing: LOW - Requires local browser access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users sharing workstations or using shared kiosks could be affected.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to browser cache. No authentication bypass needed beyond physical/network access to the browser.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.112+, Liferay DXP 2023.Q4.11+, 2023.Q3.11+, 7.4 update 93+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62276

Restart Required: Yes

Instructions:

1. Download appropriate patch from Liferay Customer Portal. 2. Apply patch following Liferay's patching guide. 3. Restart Liferay instance. 4. Verify cache-control headers are properly set.

🔧 Temporary Workarounds

Configure browser cache settings

all

Configure browsers to clear cache on exit or disable caching for Liferay sites

Browser-specific settings (e.g., Chrome: Settings > Privacy and security > Clear browsing data > Cached images and files)

Implement HTTP header security

linux

Use web application firewall or reverse proxy to add proper cache-control headers

nginx: add_header Cache-Control "no-store, no-cache, must-revalidate, max-age=0";
Apache: Header set Cache-Control "no-store, no-cache, must-revalidate, max-age=0"

🧯 If You Can't Patch

  • Implement strict browser policies to clear cache automatically on shared systems
  • Disable Document Library and Adaptive Media modules if not essential

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel > Configuration > Server Administration > System Information, then compare to affected versions

Check Version:

Check liferay-portal.xml or via Control Panel interface

Verify Fix Applied:

1. Verify version is patched. 2. Test file downloads and inspect HTTP response headers for proper Cache-Control: no-store, no-cache headers

📡 Detection & Monitoring

Log Indicators:

  • Multiple file downloads from same IP/user in short timeframe
  • Unusual access patterns to document library

Network Indicators:

  • HTTP responses missing proper cache-control headers for document/media downloads

SIEM Query:

source="liferay" AND (event="FILE_DOWNLOAD" OR uri="/documents/") | stats count by src_ip, user

🔗 References

📤 Share & Export