Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.liferay/com.liferay.roles.selector.web
  4. ›
  5. CVE-2025-43732

CVE-2025-43732: Liferay Portal Vulnerable to Insecure Direct Object Reference

August 18, 2025

Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.10, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.17 and 7.4 GA through update 92 is vulnerable to Insecure Direct Object Reference (IDOR) in the groupId parameter of the _com_liferay_roles_selector_web_portlet_RolesSelectorPortlet_groupId. When an organization administrator modifies this parameter id value, they can gain unauthorized access to user lists from other organizations.

References

  • github.com/advisories/GHSA-v6xr-v2qg-h22h
  • github.com/liferay/liferay-portal
  • github.com/liferay/liferay-portal/commit/1ab3de8142d9201d10d89f5eeb1edeea64599d57
  • github.com/liferay/liferay-portal/commit/830140e15ccfeb105641681c4f2bb375c12582ba
  • github.com/liferay/liferay-portal/commit/f07339e42a5788aa44016c4ca566b92399643442
  • liferay.atlassian.net/browse/LPE-18221
  • liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43732
  • nvd.nist.gov/vuln/detail/CVE-2025-43732

Code Behaviors & Features

Detect and mitigate CVE-2025-43732 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.0.32

Fixed versions

  • 5.0.32

Solution

Upgrade to version 5.0.32 or above.

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

maven/com.liferay/com.liferay.roles.selector.web/CVE-2025-43732.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:44 +0000.