Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay.portal/release.portal.bom
  4. ›
  5. CVE-2025-62266

CVE-2025-62266: Liferay Portal is vulnerable to DNS rebinding attacks

October 30, 2025 (updated October 31, 2025)

By default, Liferay Portal 7.4.0 through 7.4.3.119, and older unsupported versions, and Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions is vulnerable to DNS rebinding attacks, which allows remote attackers to redirect users to arbitrary external URLs. This vulnerability can be mitigated by changing the redirect URL security from IP to domain.

References

  • github.com/advisories/GHSA-f5vh-4rj2-w8r8
  • github.com/liferay/liferay-portal
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62256
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62257
  • nvd.nist.gov/vuln/detail/CVE-2025-62266

Code Behaviors & Features

Detect and mitigate CVE-2025-62266 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.4.0-ga1 before 7.4.3.110

Fixed versions

  • 7.4.3.110

Solution

Upgrade to version 7.4.3.110 or above.

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

maven/com.liferay.portal/release.portal.bom/CVE-2025-62266.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 09 Nov 2025 12:20:01 +0000.