CVE Vulnerabilities

CVE-2025-62257

Improper Restriction of Excessive Authentication Attempts

Published: Oct 30, 2025 | Modified: Nov 10, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Password enumeration vulnerability in Liferay Portal 7.4.0 through 7.4.3.119, and older unsupported versions, and Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions allows remote attackers to determine a user’s password even if account lockout is enabled via brute force attack.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.

Affected Software

Name Vendor Start Version End Version
Digital_experience_platform Liferay * 7.4 (including)
Digital_experience_platform Liferay 2023.q3.0 (including) 2023.q3.0 (including)
Digital_experience_platform Liferay 2023.q4.0 (including) 2023.q4.0 (including)
Digital_experience_platform Liferay 2024.q1.1 (including) 2024.q1.1 (including)
Digital_experience_platform Liferay 2024.q1.2 (including) 2024.q1.2 (including)
Digital_experience_platform Liferay 2024.q1.3 (including) 2024.q1.3 (including)
Digital_experience_platform Liferay 2024.q1.4 (including) 2024.q1.4 (including)
Digital_experience_platform Liferay 2024.q1.5 (including) 2024.q1.5 (including)
Liferay_portal Liferay 7.4.0 (including) 7.4.3.120 (excluding)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References