Skip to content

Commit 1b46cc8

Browse files
1 parent 7af17f3 commit 1b46cc8

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

advisories/github-reviewed/2025/09/GHSA-hrqm-qpw9-w8rv/GHSA-hrqm-qpw9-w8rv.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hrqm-qpw9-w8rv",
4-
"modified": "2025-09-26T13:04:13Z",
4+
"modified": "2025-12-16T23:59:47Z",
55
"published": "2025-09-25T21:30:25Z",
66
"aliases": [
77
"CVE-2025-43816"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
1515
}
1616
],
1717
"affected": [

advisories/github-reviewed/2025/09/GHSA-pw86-qvx9-34r7/GHSA-pw86-qvx9-34r7.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pw86-qvx9-34r7",
4-
"modified": "2025-10-01T15:56:54Z",
4+
"modified": "2025-12-17T00:00:18Z",
55
"published": "2025-09-30T21:31:16Z",
66
"aliases": [
77
"CVE-2025-43827"
88
],
99
"summary": "Liferay Portal Vulnerable to IDOR via audit events",
10-
"details": "Insecure Direct Object Reference (IDOR) vulnerability with audit events in Liferay Portal 7.4.0 through 7.4.3.117, and older unsupported versions, and Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions allows remote authenticated users to from one virtual instance to view the audit events from a different virtual instance via the _com_liferay_portal_security_audit_web_portlet_AuditPortlet_auditEventId parameter.",
10+
"details": "Insecure Direct Object Reference (IDOR) vulnerability with audit events in Liferay Portal 7.4.0 through 7.4.3.117, and older unsupported versions, and Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions allows remote authenticated users to from one virtual instance to view the audit events from a different virtual instance via the `_com_liferay_portal_security_audit_web_portlet_AuditPortlet_auditEventId` parameter.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",

advisories/github-reviewed/2025/09/GHSA-rpx3-f938-xj5q/GHSA-rpx3-f938-xj5q.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rpx3-f938-xj5q",
4-
"modified": "2025-09-27T03:25:21Z",
4+
"modified": "2025-12-16T23:59:11Z",
55
"published": "2025-09-24T03:30:26Z",
66
"aliases": [
77
"CVE-2025-43819"
88
],
99
"summary": "Liferay Portal and DXP does not properly expire sessions",
10-
"details": "### Summary\n\nLiferay Portal/DXP contains an Insufficient Session Expiration issue where the Single Logout (SLO) API may fail to invalidate a user’s previous session. An attacker can reuse a stale session via the SLO endpoint to gain an authenticated context.\n\n### Affected Versions\n\nThe following platform versions are affected:\n\n* **Liferay Portal:** `7.3.3.131` through `7.4.3.121`\n* **Liferay DXP:**\n * `2024.Q4.0`–`2024.Q4.3`\n * `2024.Q3.1`–`2024.Q3.13`\n * `2024.Q2.0`–`2024.Q2.13`\n * `2024.Q1.1`–`2024.Q1.12`\n\n### Remediation\n\nUpdate to the fixed builds and, for Maven consumers of the SAML module, upgrade `com.liferay:com.liferay.saml.impl` to **5.0.51** or later. After upgrading, ensure session invalidation policies are enforced and verify SLO behavior end-to-end.",
10+
"details": "### Summary\n\nLiferay Portal/DXP contains an Insufficient Session Expiration issue where the Single Logout (SLO) API may fail to invalidate a user’s previous session. An attacker can reuse a stale session via the SLO endpoint to gain an authenticated context.\n\n### Affected Versions\n\nThe following platform versions are affected:\n\n* **Liferay Portal:** \n * `7.3.3.131` through `7.4.3.121`\n* **Liferay DXP:**\n * `2024.Q4.0`–`2024.Q4.3`\n * `2024.Q3.1`–`2024.Q3.13`\n * `2024.Q2.0`–`2024.Q2.13`\n * `2024.Q1.1`–`2024.Q1.12`\n\n### Remediation\n\nUpdate to the fixed builds and, for Maven consumers of the SAML module, upgrade `com.liferay:com.liferay.saml.impl` to **5.0.51** or later. After upgrading, ensure session invalidation policies are enforced and verify SLO behavior end-to-end.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",

0 commit comments

Comments
 (0)