Miggo Logo

CVE-2025-43745: Liferay Portal CSRF Vulnerability via Endpoint Parameter

N/A

CVSS Score

Basic Information

EPSS Score
0.14488%
Published
8/19/2025
Updated
8/20/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:release.portal.bommaven>= 7.4.0-ga1, <= 7.4.3.132-ga132

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a classic CSRF issue where the application fails to validate the origin of a request. The provided commits clearly show that the APIGUI.js component was modified to fix this issue. Specifically, the useEffect hook within this component was changed to correctly parse the origin of the URL from the endpoint parameter. The original implementation was flawed, allowing an attacker to craft a malicious URL that would be processed by the application, leading to unauthorized actions. The patch addresses this by using the URL API to reliably extract the origin, ensuring that only requests from trusted sources are processed. The addition of a functional test in a separate commit further confirms that the fix is effective. Therefore, the APIGUI component is the primary vulnerable function, and the useEffect hook is the specific location of the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *SR* vuln*r**ility in Li**r*y Port*l *.*.* t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****

Reasoning

T** vuln*r**ility is * *l*ssi* *SR* issu* w**r* t** *ppli**tion **ils to v*li**t* t** ori*in o* * r*qu*st. T** provi*** *ommits *l**rly s*ow t**t t** `*PI*UI.js` *ompon*nt w*s mo*i*i** to *ix t*is issu*. Sp**i*i**lly, t** `us******t` *ook wit*in t*is