{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3639","assignerOrgId":"8b54e794-c6f0-462e-9faa-c1001a673ac3","state":"PUBLISHED","assignerShortName":"Liferay","dateReserved":"2025-04-15T11:49:52.301Z","datePublished":"2025-08-18T16:48:41.222Z","dateUpdated":"2025-08-18T19:51:51.759Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Portal","vendor":"Liferay","versions":[{"lessThanOrEqual":"7.4.3.132","status":"affected","version":"7.3.0","versionType":"maven"}]},{"defaultStatus":"unaffected","product":"DXP","vendor":"Liferay","versions":[{"lessThanOrEqual":"7.3.10-u36","status":"affected","version":"7.3.10","versionType":"maven"},{"lessThanOrEqual":"7.4.13-u92","status":"affected","version":"7.4.13","versionType":"maven"},{"lessThanOrEqual":"2024.Q1.15","status":"affected","version":"2024.Q1.1","versionType":"maven"},{"lessThanOrEqual":"2023.Q2.13","status":"affected","version":"2024Q2.0","versionType":"maven"},{"lessThanOrEqual":"2024.Q3.13","status":"affected","version":"2024.Q3.1","versionType":"maven"},{"lessThanOrEqual":"2024.Q4.7","status":"affected","version":"2024.Q4.0","versionType":"maven"},{"lessThanOrEqual":"2025.Q1.6","status":"affected","version":"2025.Q1.0","versionType":"maven"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Liferay Portal 7.3.0 through 7.4.3.132, and Liferay DXP 2025.Q1 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 and 7.3 GA through update 36 allows unauthenticated users with valid credentials to bypass the login process by changing the POST method to GET, once the site has MFA enabled."}],"value":"Liferay Portal 7.3.0 through 7.4.3.132, and Liferay DXP 2025.Q1 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 and 7.3 GA through update 36 allows unauthenticated users with valid credentials to bypass the login process by changing the POST method to GET, once the site has MFA enabled."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":2,"baseSeverity":"LOW","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288: Authentication Bypass Using an Alternate Path or Channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8b54e794-c6f0-462e-9faa-c1001a673ac3","shortName":"Liferay","dateUpdated":"2025-08-18T16:48:41.222Z"},"references":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-3639"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-18T19:51:41.548713Z","id":"CVE-2025-3639","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-18T19:51:51.759Z"}}]}}