
Cloud Vulnerability DB
A community-led vulnerabilities database
Liferay Portal 7.4.0 through 7.4.3.131, and Liferay DXP versions from 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, and 7.4 GA through update 92 are affected by a security vulnerability that allows authenticated users without any permissions to access sensitive information of admin users through JSONWS APIs (Liferay Advisory).
The vulnerability has been assigned a CVSS v4.0 Base Score of 5.1 (Medium) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N. The vulnerability is classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) and affects the JSONWS API endpoints (NVD, Liferay Advisory).
The vulnerability allows authenticated users with no specific permissions to access sensitive information belonging to administrative users, potentially leading to unauthorized information disclosure (Liferay Advisory).
Organizations should upgrade to the fixed versions: Liferay Portal 7.4.3.132, Liferay DXP 2025.Q1.0, or Liferay DXP 2024.Q1.16 (Liferay Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."