Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay/com.liferay.comment.web
  4. ›
  5. CVE-2025-43789

CVE-2025-43789: Liferay Portal JSON Web Services Direct Class Invocation Enables Service Access Policy Execution

September 12, 2025 (updated September 15, 2025)

JSON Web Services in Liferay Portal 7.4.0 through 7.4.3.119, and Liferay DXP 2024.Q1.1 through 2024.Q1.9, 7.4 GA through update 92 published to OSGi are registered and invoked directly as classes which allows Service Access Policies to get executed.

References

  • github.com/advisories/GHSA-q86r-gwqc-jx85
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/576039619a12f28304c5153ad3fa5e39f00548b3
  • github.com/liferay/liferay-portal/commit/cb349be999396e97883e5fa7ccf2d226737779ac
  • github.com/liferay/liferay-portal/commit/dfdd81d51808e38098e9a3250f3c8819e0761377
  • github.com/liferay/liferay-portal/commit/e91daba3736ea30674f0beb5f6622c6df057d18b
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43789
  • nvd.nist.gov/vuln/detail/CVE-2025-43789

Code Behaviors & Features

Detect and mitigate CVE-2025-43789 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 6.0.2 before 6.1.4

Fixed versions

  • 6.1.4

Solution

Upgrade to version 6.1.4 or above.

Weakness

  • CWE-863: Incorrect Authorization

Source file

maven/com.liferay/com.liferay.comment.web/CVE-2025-43789.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 03 Nov 2025 00:18:59 +0000.