CVE-2025-62261: Liferay Portal Stores Password Reset Tokens in Plain Text
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.liferay.portal:release.portal.bom | maven | >= 7.4.0-ga1, < 7.4.3.100 | 7.4.3.100 |
| com.liferay.portal:com.liferay.portal.impl | maven | < 92.0.2 | 92.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the provided patch b228c7878f2ed5ad8dbc1ff7ec9b5e6d53bb4b5c clearly indicates a security vulnerability within the notifyUser method of the com.liferay.portal.service.impl.UserLocalServiceImpl class. The vulnerability lies in the handling of password reset tokens. The patch introduces encryption for the password reset token (ticket.getKey()) before it is persisted. The lines ticket.setKey(PasswordEncryptorUtil.encrypt(ticket.getKey())); and _ticketLocalService.updateTicket(ticket); are the explicit fix. This confirms that prior to this change, the token was stored in cleartext, which is the core of the described vulnerability (CVE-2025-62261). Therefore, the notifyUser function is the vulnerable function, as it is responsible for generating and storing the unencrypted token.
Vulnerable functions
com.liferay.portal.service.impl.UserLocalServiceImpl.notifyUserportal-impl/src/com/liferay/portal/service/impl/UserLocalServiceImpl.java