CVE-2025-62261: Liferay Portal Stores Password Reset Tokens in Plain Text
(updated )
Liferay Portal 7.4.0 through 7.4.3.99, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 34, and older unsupported versions stores password reset tokens in plain text, which allows attackers with access to the database to obtain the token, reset a user’s password and take over the user’s account.
References
- github.com/advisories/GHSA-xcj6-xpjg-c4xr
- github.com/liferay/liferay-portal
- github.com/liferay/liferay-portal/commit/b228c7878f2ed5ad8dbc1ff7ec9b5e6d53bb4b5c
- liferay.atlassian.net/browse/LPE-17785
- liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62261
- nvd.nist.gov/vuln/detail/CVE-2025-62261
Code Behaviors & Features
Detect and mitigate CVE-2025-62261 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →