Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay.portal/release.portal.bom
  4. ›
  5. CVE-2024-26270

CVE-2024-26270: Liferay Portal and Liferay DXP vulnerable to theft of hashed password

February 20, 2024 (updated January 28, 2025)

The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user’s hashed password in the page’s HTML source, which allows man-in-the-middle attackers to steal a user’s hashed password.

References

  • github.com/advisories/GHSA-xq4r-4xfh-vch8
  • github.com/liferay/liferay-portal
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270
  • nvd.nist.gov/vuln/detail/CVE-2024-26270

Code Behaviors & Features

Detect and mitigate CVE-2024-26270 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.4.3.76 before 7.4.3.100

Fixed versions

  • 7.4.3.100

Solution

Upgrade to version 7.4.3.100 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-201: Insertion of Sensitive Information Into Sent Data

Source file

maven/com.liferay.portal/release.portal.bom/CVE-2024-26270.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:39 +0000.