Server-side Request Forgery (SSRF) Affecting com.liferay:com.liferay.portal.settings.authentication.opensso.web package, versions [,5.0.21)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMLIFERAY-11776784
  • published12 Aug 2025
  • disclosed9 Aug 2025
  • creditShubham Shah

Introduced: 9 Aug 2025

NewCVE-2025-4581  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade com.liferay:com.liferay.portal.settings.authentication.opensso.web to version 5.0.21 or higher.

Overview

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via improper validation of user-supplied URLs in the portal-settings-authentication-opensso-web component. An unauthenticated attacker can cause the server to initiate arbitrary HTTP requests to internal systems by supplying crafted URLs, potentially enabling internal network enumeration or further exploitation.

CVSS Base Scores

version 4.0
version 3.1