Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay/com.liferay.object.dynamic.data.mapping.form.field.type
  4. ›
  5. CVE-2025-43758

CVE-2025-43758: Liferay Portal's unauthenticated users can access loaded files via URL before submitting the object entry

August 22, 2025 (updated August 25, 2025)

Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allows unauthenticated users (guests) to access via URL files uploaded by object entry and stored in document_library

References

  • github.com/advisories/GHSA-mm62-gwj5-j285
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/bf036898c413b6733918f4bfeba59896f1abb34a
  • github.com/liferay/liferay-portal/commit/ff4efcb59b6b9acf548d37787b8d4b3d1126fff8
  • liferay.atlassian.net/browse/LPE-18186
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43758
  • nvd.nist.gov/vuln/detail/CVE-2025-43758

Code Behaviors & Features

Detect and mitigate CVE-2025-43758 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.0.65

Fixed versions

  • 1.0.65

Solution

Upgrade to version 1.0.65 or above.

Weakness

  • CWE-552: Files or Directories Accessible to External Parties

Source file

maven/com.liferay/com.liferay.object.dynamic.data.mapping.form.field.type/CVE-2025-43758.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 27 Aug 2025 00:18:41 +0000.