CVE-2025-43789: Liferay Portal JSON Web Services Direct Class Invocation Enables Service Access Policy Execution
(updated )
JSON Web Services in Liferay Portal 7.4.0 through 7.4.3.119, and Liferay DXP 2024.Q1.1 through 2024.Q1.9, 7.4 GA through update 92 published to OSGi are registered and invoked directly as classes which allows Service Access Policies to get executed.
References
- github.com/advisories/GHSA-q86r-gwqc-jx85
- github.com/liferay/liferay-portal
- github.com/liferay/liferay-portal/commit/576039619a12f28304c5153ad3fa5e39f00548b3
- github.com/liferay/liferay-portal/commit/cb349be999396e97883e5fa7ccf2d226737779ac
- github.com/liferay/liferay-portal/commit/dfdd81d51808e38098e9a3250f3c8819e0761377
- github.com/liferay/liferay-portal/commit/e91daba3736ea30674f0beb5f6622c6df057d18b
- liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43789
- nvd.nist.gov/vuln/detail/CVE-2025-43789
Code Behaviors & Features
Detect and mitigate CVE-2025-43789 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →