GHSA-3cm9-jrf5-h2cx

Suggest an improvement
Source
https://github.com/advisories/GHSA-3cm9-jrf5-h2cx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-3cm9-jrf5-h2cx/GHSA-3cm9-jrf5-h2cx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3cm9-jrf5-h2cx
Aliases
  • CVE-2025-62242
Published
2025-10-13T21:31:10Z
Modified
2025-10-13T23:12:29.927917Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
Liferay Account Admin Web vulnerable to Authorization Bypass Through User-Controlled Key
Details

Insecure Direct Object Reference (IDOR) vulnerability with account addresses in Liferay Portal 7.4.3.4 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 GA through update 92 allows remote authenticated users to from one account to view addresses from a different account via the comliferayaccountadminwebinternalportletAccountEntriesAdminPortlet_addressId parameter.

Database specific
{
    "github_reviewed_at": "2025-10-13T22:43:21Z",
    "github_reviewed": true,
    "severity": "MODERATE",
    "nvd_published_at": "2025-10-13T20:15:34Z",
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Maven / com.liferay:com.liferay.change.tracking.web

Package

Name
com.liferay:com.liferay.change.tracking.web
View open source insights on deps.dev
Purl
pkg:maven/com.liferay/com.liferay.change.tracking.web

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.120

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10
1.0.11
1.0.12
1.0.13
1.0.14
1.0.15
1.0.16
1.0.17
1.0.18
1.0.19
1.0.20
1.0.21
1.0.22
1.0.23
1.0.24
1.0.25
1.0.26
1.0.27
1.0.28
1.0.29
1.0.30
1.0.31
1.0.32
1.0.33
1.0.34
1.0.35
1.0.36
1.0.37
1.0.38
1.0.39
1.0.40
1.0.41
1.0.42
1.0.43
1.0.44
1.0.45
1.0.46
1.0.47
1.0.48
1.0.49
1.0.50
1.0.51
1.0.52
1.0.53
1.0.54
1.0.55
1.0.56
1.0.57
1.0.58
1.0.59
1.0.60
1.0.61
1.0.62
1.0.63
1.0.64
1.0.65
1.0.66
1.0.67
1.0.68
1.0.69
1.0.70
1.0.71
1.0.72
1.0.73
1.0.74
1.0.75
1.0.76
1.0.77
1.0.78
1.0.79
1.0.80
1.0.81
1.0.82
1.0.83
1.0.84
1.0.85
1.0.86
1.0.87
1.0.88

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.0.9
2.0.10
2.0.11
2.0.12
2.0.13
2.0.14
2.0.15
2.0.16
2.0.17
2.0.18
2.0.19
2.0.20
2.0.21
2.0.22
2.0.23
2.0.24
2.0.25
2.0.26
2.0.27
2.0.28
2.0.29
2.0.30
2.0.31
2.0.32
2.0.33
2.0.34
2.0.35
2.0.36
2.0.37
2.0.38
2.0.39
2.0.40
2.0.41
2.0.42
2.0.43
2.0.44
2.0.45
2.0.46
2.0.47
2.0.48
2.0.49
2.0.50
2.0.51
2.0.52
2.0.53
2.0.54
2.0.55
2.0.56
2.0.57
2.0.58
2.0.59
2.0.60
2.0.61
2.0.62
2.0.63
2.0.64
2.0.65
2.0.66
2.0.67
2.0.68
2.0.69
2.0.70
2.0.71
2.0.72
2.0.73
2.0.74
2.0.75
2.0.76
2.0.77
2.0.78
2.0.79
2.0.80
2.0.81
2.0.82
2.0.83
2.0.84
2.0.85
2.0.86
2.0.87
2.0.88
2.0.89
2.0.90
2.0.91
2.0.92
2.0.93
2.0.94
2.0.95
2.0.96
2.0.97
2.0.98
2.0.99
2.0.100
2.0.101
2.0.102
2.0.103
2.0.104
2.0.105
2.0.106
2.0.107
2.0.108
2.0.109
2.0.110
2.0.111
2.0.112
2.0.113
2.0.114
2.0.115
2.0.116
2.0.117
2.0.118
2.0.119