Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay.portal/release.portal.bom
  4. ›
  5. CVE-2025-62261

CVE-2025-62261: Liferay Portal Stores Password Reset Tokens in Plain Text

October 28, 2025 (updated October 29, 2025)

Liferay Portal 7.4.0 through 7.4.3.99, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 34, and older unsupported versions stores password reset tokens in plain text, which allows attackers with access to the database to obtain the token, reset a user’s password and take over the user’s account.

References

  • github.com/advisories/GHSA-xcj6-xpjg-c4xr
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/b228c7878f2ed5ad8dbc1ff7ec9b5e6d53bb4b5c
  • liferay.atlassian.net/browse/LPE-17785
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62261
  • nvd.nist.gov/vuln/detail/CVE-2025-62261

Code Behaviors & Features

Detect and mitigate CVE-2025-62261 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.4.0-ga1 before 7.4.3.100

Fixed versions

  • 7.4.3.100

Solution

Upgrade to version 7.4.3.100 or above.

Weakness

  • CWE-312: Cleartext Storage of Sensitive Information

Source file

maven/com.liferay.portal/release.portal.bom/CVE-2025-62261.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 08 Nov 2025 00:21:00 +0000.