logo

CVE-2025-43750 com.liferay:com.liferay.dynamic.data.mapping.form.web

Package

Manager: maven
Name: com.liferay:com.liferay.dynamic.data.mapping.form.web
Vulnerable Version: >=0 <4.0.180

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

EPSS: 0.00055 pctl0.17245

Details

Liferay Portal Unvalidated File Upload Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.1, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows remote unauthenticated users (guests) to upload files via the form attachment field without proper validation, enabling extension obfuscation and bypassing MIME type checks.

Metadata

Created: 2025-08-20T15:31:41Z
Modified: 2025-08-20T20:46:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-56qj-wp5r-mvhj/GHSA-56qj-wp5r-mvhj.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-56qj-wp5r-mvhj
Finding: F027
Auto approve: 1