CVE-2025-43786: Liferay Portal exposes ERC which can lead to exploit the time response attack
(updated )
Enumeration of ERC from object entry in Liferay Portal 7.4.0 through 7.4.3.128, and Liferay DXP 2024.Q3.0 through 2024.Q3.1, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 and 7.4 GA through update 92 allow attackers to determine existent ERC in the application by exploit the time response.
References
- github.com/advisories/GHSA-9p7x-8c57-4pqv
- github.com/liferay/liferay-portal
- github.com/liferay/liferay-portal/commit/8f9728086bd61661437b0aa8493c83510914a474
- github.com/liferay/liferay-portal/commit/e34499eab2ce1d544835835afe6733a78b4ab532
- github.com/liferay/liferay-portal/commit/e4a140d6d92e92911f08fe33051b677742531f19
- liferay.atlassian.net/browse/LPE-18106
- liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43786
- nvd.nist.gov/vuln/detail/CVE-2025-43786
Code Behaviors & Features
Detect and mitigate CVE-2025-43786 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →