CVE-2025-43824
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-12-15
Assigner: Liferay Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liferay | digital_experience_platform | to 7.4 (inc) |
| liferay | digital_experience_platform | From 2023.q3.1 (inc) to 2023.q3.9 (exc) |
| liferay | digital_experience_platform | From 2023.q4.0 (inc) to 2023.q4.6 (exc) |
| liferay | liferay_portal | to 7.4.3.112 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Profile widget of certain Liferay Portal and Liferay DXP versions. It involves the use of a user's name in the "Content-Disposition" header when downloading a vCard file. Because of this, remote authenticated users can manipulate the file extension of the downloaded vCard file, potentially causing unexpected behavior or security issues.
How can this vulnerability impact me? :
The vulnerability allows remote authenticated users to change the file extension of downloaded vCard files. This could lead to security risks such as executing malicious files if the file extension is changed to an executable type, or bypassing security controls that rely on file extensions. It may also cause confusion or improper handling of files by users or systems.