Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay.portal/com.liferay.portal.impl
  4. ›
  5. CVE-2025-43768

CVE-2025-43768: Liferay Portal JSONWS API endpoint shares sensitive information

August 23, 2025 (updated August 25, 2025)

Liferay Portal 7.4.0 through 7.4.3.131, and Liferay DXP 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allows authenticated users without any permissions to access sensitive information of admin users using JSONWS APIs.

References

  • github.com/advisories/GHSA-cv9j-mg9w-v7wm
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/efdbdbce73605ecd13b1a5e60f5186cc59f09c16
  • liferay.atlassian.net/browse/LPE-18154
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43768
  • nvd.nist.gov/vuln/detail/CVE-2025-43768

Code Behaviors & Features

Detect and mitigate CVE-2025-43768 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 108.1.1

Fixed versions

  • 108.1.1

Solution

Upgrade to version 108.1.1 or above.

Weakness

  • CWE-201: Insertion of Sensitive Information Into Sent Data

Source file

maven/com.liferay.portal/com.liferay.portal.impl/CVE-2025-43768.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 27 Aug 2025 00:18:47 +0000.