CVE-2025-43758 – com.liferay:com.liferay.object.dynamic.data.mapping.form.field.type
Package
Manager: maven
Name: com.liferay:com.liferay.object.dynamic.data.mapping.form.field.type
Vulnerable Version: >=0 <1.0.65
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
EPSS: 0.00068 pctl0.21274
Details
Liferay Portal's unauthenticated users can access loaded files via URL before submitting the object entry Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allows unauthenticated users (guests) to access via URL files uploaded by object entry and stored in document_library
Metadata
Created: 2025-08-22T21:31:16Z
Modified: 2025-08-25T17:54:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-mm62-gwj5-j285/GHSA-mm62-gwj5-j285.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-mm62-gwj5-j285
Finding: F201
Auto approve: 1