
Cloud Vulnerability DB
A community-led vulnerabilities database
The Portal Workflow module in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 93, 7.1 before fix pack 19, and 7.2 before fix pack 7, contains a security vulnerability where user's clear text passwords are stored in the database if workflow is enabled for user creation. This vulnerability is tracked as CVE-2021-33325 and was disclosed in May 2021 (MITRE).
The vulnerability has been assigned a CVSS v3.1 score of 4.9 (MEDIUM) and a CVSS v2.0 score of 4.0 (MEDIUM). The issue specifically occurs when workflow functionality is enabled for user creation, resulting in the storage of plaintext passwords in the database (NVD).
The vulnerability allows attackers with access to the database to obtain users' passwords in clear text format. This could potentially lead to unauthorized access to user accounts and compromise of user credentials (MITRE).
Organizations should upgrade to the fixed versions: Liferay DXP 7.0 fix pack 93 or later, 7.1 fix pack 19 or later, or 7.2 fix pack 7 or later. For Liferay Portal users, versions after 7.3.2 contain the fix (MITRE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."