CVE-2025-43750 – com.liferay:com.liferay.dynamic.data.mapping.form.web
Package
Manager: maven
Name: com.liferay:com.liferay.dynamic.data.mapping.form.web
Vulnerable Version: >=0 <4.0.180
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.00055 pctl0.17245
Details
Liferay Portal Unvalidated File Upload Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.1, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows remote unauthenticated users (guests) to upload files via the form attachment field without proper validation, enabling extension obfuscation and bypassing MIME type checks.
Metadata
Created: 2025-08-20T15:31:41Z
Modified: 2025-08-20T20:46:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-56qj-wp5r-mvhj/GHSA-56qj-wp5r-mvhj.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-56qj-wp5r-mvhj
Finding: F027
Auto approve: 1