Description
Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92 and 7.3 GA through update 35 allows a time-based one-time password (TOTP) to be used multiple times during the validity period, which allows attackers with access to a user’s TOTP to authenticate as the user.
Published: 2025-09-15
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29257 Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92 and 7.3 GA through update 35 allows a time-based one-time password (TOTP) to be used multiple times during the validity period, which allows attackers with access to a user’s TOTP to authenticate as the user.
Github GHSA Github GHSA GHSA-4p5r-3jmm-652q Liferay DXP Missing Critical Step in Authentication
History

Tue, 16 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Liferay digital Experience Platform
CPEs cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:2023.q4.0:*:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_2:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update1:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update2:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update3:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:*:*:*:*:*:*:*
Vendors & Products Liferay digital Experience Platform
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Liferay
Liferay dxp
Vendors & Products Liferay
Liferay dxp

Tue, 16 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 21:00:00 +0000

Type Values Removed Values Added
Description Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92 and 7.3 GA through update 35 allows a time-based one-time password (TOTP) to be used multiple times during the validity period, which allows attackers with access to a user’s TOTP to authenticate as the user.
Weaknesses CWE-304
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Liferay Digital Experience Platform Dxp
cve-icon MITRE

Status: PUBLISHED

Assigner: Liferay

Published:

Updated: 2025-09-16T15:45:47.329Z

Reserved: 2025-04-17T10:55:31.458Z

Link: CVE-2025-43798

cve-icon Vulnrichment

Updated: 2025-09-16T15:45:44.245Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-15T21:15:35.760

Modified: 2025-12-16T16:36:29.873

Link: CVE-2025-43798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-17T10:06:28Z

Weaknesses