CVE-2025-43792

MEDIUM

Liferay Portal <7.4.3.105 - Info Disclosure

Title source: llm
STIX 2.1

Description

Remote staging in Liferay Portal 7.4.0 through 7.4.3.105, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not properly obtain the remote address of the live site from the database which, which allows remote authenticated users to exfiltrate data to an attacker controlled server (i.e., a fake “live site”) via the _com_liferay_exportimport_web_portlet_ExportImportPortlet_remoteAddress and _com_liferay_exportimport_web_portlet_ExportImportPortlet_remotePort parameters. To successfully exploit this vulnerability, an attacker must also successfully obtain the staging server’s shared secret and add the attacker controlled server to the staging server’s whitelist.

Scores

CVSS v3 5.3
EPSS 0.0005
EPSS Percentile 13.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-15
Status published
Products (3)
com.liferay.portal/com.liferay.portal.kernel 0 - 130.0.1Maven
liferay/digital_experience_platform 7.3 (41 CPE variants)
liferay/digital_experience_platform 7.4 (8 CPE variants)
Published Sep 15, 2025
Tracked Since Feb 18, 2026