CVE-2025-43767: Liferay Portal allows open redirect in /c/portal/edit_info_item parameter redirect
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.liferay:com.liferay.info.impl | maven | < 5.0.69 | 5.0.69 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is an open redirect in Liferay Portal. The provided commit 04d6892c12f8c3d12085124b6cb856dfacb9bb89 clearly shows the fix for this vulnerability. The patch modifies the EditInfoItemStrutsAction.java file, specifically within the processAction method. The vulnerable code, httpServletResponse.sendRedirect(redirect);, is replaced with httpServletResponse.sendRedirect(_portal.escapeRedirect(redirect));. This indicates that the redirect parameter, which is user-controlled, was not being validated, allowing for an open redirect. The vulnerable function is therefore com.liferay.info.internal.request.struts.EditInfoItemStrutsAction.processAction, as this is where the unsanitized user input is used to perform the redirect. A runtime profiler would show this function in the stack trace during exploitation of this vulnerability.