CVE-2025-62250
Java vulnerability analysis and mitigation

Overview

A critical authentication vulnerability (CVE-2025-62250) was discovered in Liferay Portal and DXP systems. The vulnerability affects Liferay Portal versions 7.4.0 through 7.4.3.132 and various Liferay DXP versions including 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, and 7.3 GA through update 35. The issue was disclosed on May 8, 2025, and involves improper authentication mechanisms that could allow remote attackers to exploit cluster message functionality (Liferay Advisory).

Technical details

The vulnerability stems from an improper authentication mechanism in Liferay's cluster messaging system. The flaw allows remote attackers to send unauthenticated cluster messages that the system incorrectly treats as trusted data. The vulnerability has been assigned a CVSS v4.0 score of 6.9 (Medium), with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N, indicating network accessibility with low attack complexity and no authentication requirements (Liferay Advisory).

Impact

The vulnerability allows attackers to inject malicious data into the system through cluster messages, which will be processed as trusted information. This could potentially lead to unauthorized data manipulation and system compromise, though the impact is rated as Low for both Confidentiality and Integrity aspects, with no impact on Availability (Liferay Advisory).

Mitigation and workarounds

Fixed versions have been released to address this vulnerability. Organizations should upgrade to Liferay Portal's fixed master branch version, Liferay DXP 2024.Q1.1, DXP 2023.Q4.1, DXP 2023.Q3.5, or DXP 7.3 update 36. These versions include patches that properly validate cluster messages and prevent unauthorized data injection (Liferay Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-56316CRITICAL9.8
  • JavaJava
  • net.mingsoft:ms-mcms
NoYesOct 17, 2025
CVE-2025-47410HIGH8.8
  • JavaJava
  • cpe:2.3:a:apache:geode
NoYesOct 18, 2025
CVE-2025-57738HIGH7.2
  • JavaJava
  • org.apache.syncope.core:syncope-core-spring
NoYesOct 20, 2025
CVE-2025-62249MEDIUM6.9
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesOct 21, 2025
CVE-2025-62250MEDIUM6.9
  • JavaJava
  • com.liferay:com.liferay.portal.cluster.multiple
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management