CVE-2025-43809
BaseFortify
Publication date: 2025-09-19
Last updated on: 2025-12-16
Assigner: Liferay Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liferay | digital_experience_platform | to 7.4 (inc) |
| liferay | digital_experience_platform | From 2023.q3.1 (inc) to 2023.q3.9 (exc) |
| liferay | digital_experience_platform | From 2023.Q4.0 (inc) to 2023.Q4.8 (exc) |
| liferay | liferay_portal | From 7.4.0 (inc) to 7.4.3.112 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-43809 is a Cross-Site Request Forgery (CSRF) vulnerability in the server license registration page of Liferay Portal and Liferay DXP. It allows remote attackers to register a server license by exploiting the 'orderUuid' parameter without proper authorization, potentially causing unauthorized license registrations. [1]
How can this vulnerability impact me? :
This vulnerability can allow attackers to register server licenses remotely without authorization, which may lead to unauthorized use or manipulation of licensing on affected Liferay Portal and DXP installations. This could result in licensing compliance issues or operational disruptions. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring HTTP requests to the server license registration page for suspicious use of the 'orderUuid' parameter that could indicate CSRF attempts. You can use network traffic analysis tools like Wireshark or tcpdump to capture HTTP POST requests to the license registration endpoint and inspect the parameters. Additionally, using curl or similar command-line tools to test the endpoint with crafted requests containing the 'orderUuid' parameter may help identify if the system is vulnerable. Example command to test the endpoint: curl -X POST 'http://<liferay-server>/license-registration' -d 'orderUuid=<test-value>' -v [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading Liferay Portal and Liferay DXP to the fixed versions: Liferay Portal 7.4.3.112 or later, Liferay DXP 2024.Q1.1 or later, Liferay DXP 2023.Q4.8 or later, or Liferay DXP 2023.Q3.9 or later. If upgrading is not immediately possible, implement CSRF protection mechanisms such as validating CSRF tokens on the license registration page and restricting access to the registration endpoint to authorized users only. [1]