Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 30 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 30 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 30 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | By default, Liferay Portal 7.4.0 through 7.4.3.119, and older unsupported versions, and Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions is vulnerable to DNS rebinding attacks, which allows remote attackers to redirect users to arbitrary external URLs. This vulnerability can be mitigated by changing the redirect URL security from IP to domain. | |
| Weaknesses | CWE-601 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Liferay
Published:
Updated: 2025-10-30T19:06:43.671Z
Reserved: 2025-10-09T20:58:53.012Z
Link: CVE-2025-62266
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-30T19:06:40.367Z
 NVD
                        NVD
                    Status : Received
Published: 2025-10-30T18:15:33.033
Modified: 2025-10-30T19:16:35.643
Link: CVE-2025-62266
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.