logo

CVE-2025-43758 com.liferay:com.liferay.object.dynamic.data.mapping.form.field.type

Package

Manager: maven
Name: com.liferay:com.liferay.object.dynamic.data.mapping.form.field.type
Vulnerable Version: >=0 <1.0.65

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

EPSS: 0.00068 pctl0.21274

Details

Liferay Portal's unauthenticated users can access loaded files via URL before submitting the object entry Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allows unauthenticated users (guests) to access via URL files uploaded by object entry and stored in document_library

Metadata

Created: 2025-08-22T21:31:16Z
Modified: 2025-08-25T17:54:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-mm62-gwj5-j285/GHSA-mm62-gwj5-j285.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-mm62-gwj5-j285
Finding: F201
Auto approve: 1