Liferay Portal 7.4.0 through 7.4.3.99, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 34, and older unsupported versions stores password reset tokens in plain text, which allows attackers with access to the database to obtain the token, reset a user’s password and take over the user’s account.
References
| Link | Resource |
|---|---|
| https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62261 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 21:49
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Liferay
Liferay liferay Portal Liferay digital Experience Platform |
|
| CPE | cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.4:*:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update1:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_2:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update2:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:* cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update3:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:* cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:* |
|
| References | () https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62261 - Vendor Advisory |
Information
Published : 2025-10-27 22:15
Updated : 2025-11-10 21:49
NVD link : CVE-2025-62261
Mitre link : CVE-2025-62261
CVE.ORG link : CVE-2025-62261
JSON object : View
Products Affected
liferay
- digital_experience_platform
- liferay_portal
CWE
CWE-312
Cleartext Storage of Sensitive Information
