Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-vp64-77c6-33h8: Liferay Portal has External Control of System or Configuration Settings

Remote staging in Liferay Portal 7.4.0 through 7.4.3.105, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not properly obtain the remote address of the live site from the database which, which allows remote authenticated users to exfiltrate data to an attacker controlled server (i.e., a fake “live site”) via the _com_liferay_exportimport_web_portlet_ExportImportPortlet_remoteAddress and _com_liferay_exportimport_web_portlet_ExportImportPortlet_remotePort parameters. To successfully exploit this vulnerability, an attacker must also successfully obtain the staging server’s shared secret and add the attacker controlled server to the staging server’s whitelist.

ghsa
#vulnerability#web#git#java#perl#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-43792

Liferay Portal has External Control of System or Configuration Settings

Low severity GitHub Reviewed Published Sep 15, 2025 to the GitHub Advisory Database • Updated Sep 15, 2025

Package

maven com.liferay.portal:com.liferay.portal.kernel (Maven)

Affected versions

< 130.0.1

Remote staging in Liferay Portal 7.4.0 through 7.4.3.105, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not properly obtain the remote address of the live site from the database which, which allows remote authenticated users to exfiltrate data to an attacker controlled server (i.e., a fake “live site”) via the _com_liferay_exportimport_web_portlet_ExportImportPortlet_remoteAddress and _com_liferay_exportimport_web_portlet_ExportImportPortlet_remotePort parameters. To successfully exploit this vulnerability, an attacker must also successfully obtain the staging server’s shared secret and add the attacker controlled server to the staging server’s whitelist.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2025-43792
  • https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43792

Published to the GitHub Advisory Database

Sep 15, 2025

Last updated

Sep 15, 2025

ghsa: Latest News

GHSA-w252-645g-87mp: Openfire has potential identity spoofing issue via unsafe CN parsing