Miggo Logo

CVE-2025-43767: Liferay Portal allows open redirect in /c/portal/edit_info_item parameter redirect

N/A

CVSS Score

Basic Information

EPSS Score
0.11279%
Published
8/23/2025
Updated
8/25/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay:com.liferay.info.implmaven< 5.0.695.0.69

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is an open redirect in Liferay Portal. The provided commit 04d6892c12f8c3d12085124b6cb856dfacb9bb89 clearly shows the fix for this vulnerability. The patch modifies the EditInfoItemStrutsAction.java file, specifically within the processAction method. The vulnerable code, httpServletResponse.sendRedirect(redirect);, is replaced with httpServletResponse.sendRedirect(_portal.escapeRedirect(redirect));. This indicates that the redirect parameter, which is user-controlled, was not being validated, allowing for an open redirect. The vulnerable function is therefore com.liferay.info.internal.request.struts.EditInfoItemStrutsAction.processAction, as this is where the unsanitized user input is used to perform the redirect. A runtime profiler would show this function in the stack trace during exploitation of this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Op*n R**ir**t vuln*r**ility in /*/port*l/**it_in*o_it*m p*r*m*t*r r**ir**t in Li**r*y Port*l *.*.*.** t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.** *n* *.* up**t* ** t*rou**

Reasoning

T** vuln*r**ility is *n op*n r**ir**t in Li**r*y Port*l. T** provi*** *ommit `****************************************` *l**rly s*ows t** *ix *or t*is vuln*r**ility. T** p*t** mo*i*i*s t** `**itIn*oIt*mStruts**tion.j*v*` *il*, sp**i*i**lly wit*in t**