CVE-2025-62244
BaseFortify
Publication date: 2025-10-13
Last updated on: 2025-12-15
Assigner: Liferay Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liferay | digital_experience_platform | From 2023.q3.1 (inc) to 2023.q3.9 (exc) |
| liferay | digital_experience_platform | From 2023.q4.0 (inc) to 2023.q4.6 (exc) |
| liferay | digital_experience_platform | 7.3 |
| liferay | digital_experience_platform | 7.4 |
| liferay | liferay_portal | From 7.3.1 (inc) to 7.4.3.112 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-62244 is an Insecure Direct Object Reference (IDOR) vulnerability in the Publications feature of Liferay Portal and Liferay DXP. It allows remote authenticated attackers to view the edit page of a publication by manipulating a specific parameter called `_com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId`. This means attackers with low privileges and user interaction can access parts of the application they should not be able to. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with valid credentials to access and view the edit page of publications they are not authorized to edit. Although the impact on confidentiality is low and there is no impact on integrity or availability, unauthorized access to edit pages could lead to information disclosure or unauthorized changes if further exploited. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring or testing for unauthorized access attempts to the edit page of publications via manipulation of the _com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId parameter. You can use web proxy tools like curl or Burp Suite to send authenticated requests with different values for this parameter and observe if access is granted improperly. For example, a curl command to test might be: curl -i -b cookie.txt 'https://your-liferay-instance.com/edit_publication?_com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId=some_id' where cookie.txt contains authenticated session cookies. Detecting unexpected access to edit pages with manipulated parameter values indicates the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading Liferay Portal or Liferay DXP to a fixed version where the vulnerability is resolved. The fixed versions are Liferay Portal 7.4.3.112, Liferay DXP 2023.Q3.9, 2023.Q4.6, or 2024.Q1.1. Until an upgrade is possible, restrict access to the Publications edit pages to trusted users only, monitor for suspicious activity involving the _com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId parameter, and consider applying web application firewall (WAF) rules to block unauthorized parameter manipulation. [1]