Miggo Logo

CVE-2025-43768: Liferay Portal JSONWS API endpoint shares sensitive information

N/A

CVSS Score

Basic Information

EPSS Score
0.08125%
Published
8/23/2025
Updated
8/25/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:com.liferay.portal.implmaven< 108.1.1108.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis of the provided commit efdbdbce73605ecd13b1a5e60f5186cc59f09c16 clearly indicates that the vulnerability is located in the getRoleUserIds method of the UserServiceImpl class. The vulnerability description states that authenticated users without sufficient permissions can access sensitive information of admin users via JSONWS APIs. The patch directly addresses this by changing the permission check from a lenient ActionKeys.VIEW to a much stricter ActionKeys.ASSIGN_MEMBERS. This change confirms that the getRoleUserIds method was the entry point for the vulnerability. An attacker could have exploited this by making a JSONWS call to this method with the role ID of an administrator role, and if they had basic view permissions, they would receive a list of user IDs belonging to that administrator role. This constitutes a sensitive information disclosure. The identified function is the exact location of the vulnerable code that was fixed.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Li**r*y Port*l *.*.* t*rou** *.*.*.***, *n* Li**r*y *XP ****.Q*.* t*rou** ****.Q*.*, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.**, ****.Q*.* t*rou** ****.Q*.** *n* *.* ** t*rou** up**t* ** *llows *ut**nti**t** us*rs wit*out *ny p*rmissi

Reasoning

T** *n*lysis o* t** provi*** *ommit `****************************************` *l**rly in*i**t*s t**t t** vuln*r**ility is lo**t** in t** `**tRol*Us*rI*s` m*t*o* o* t** `Us*rS*rvi**Impl` *l*ss. T** vuln*r**ility **s*ription st*t*s t**t *ut**nti**t**