{"id":"CVE-2025-3594","details":"Path traversal vulnerability with the downloading and installation of Xuggler in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 34, and older unsupported versions allows remote attackers to (1) add files to arbitrary locations on the server and (2) download and execute arbitrary files from the download server via the `_com_liferay_server_admin_web_portlet_ServerAdminPortlet_jarName` parameter.","aliases":["GHSA-p73j-gpcq-49h8"],"modified":"2026-04-10T05:25:39.032916Z","published":"2025-06-16T15:15:24.257Z","references":[{"type":"ADVISORY","url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-3594"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/liferay/liferay-portal","events":[{"introduced":"0"},{"last_affected":"4ffdd7225ef4a5fd922703263a3006a741a4d8d0"},{"introduced":"0"},{"last_affected":"0515646c8f638f202d107469cc147172fc7685de"},{"introduced":"0"},{"last_affected":"77b773677e0fa17b1a869414ad66220245ba96a8"},{"introduced":"0"},{"last_affected":"6d28f4266948e7b0eeb14c3e8d16b3d81e02e8bb"},{"introduced":"0"},{"last_affected":"f193301b2848899b008d51513af62a3b3a9b7888"},{"introduced":"0"},{"last_affected":"3cc350081830d5b3ed7848d769d3985a6bbf0469"},{"introduced":"0"},{"last_affected":"29b73b9b896c7d44fb5d1800a402698c303d1cf6"},{"introduced":"0"},{"last_affected":"548f3899675d89749f92b7623d25e27d0c4691c7"},{"introduced":"0"},{"last_affected":"75354f3482d7c5edb70f4cd72ed8664ce8079842"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.3-update1"},{"introduced":"0"},{"last_affected":"7.3-update2"},{"introduced":"0"},{"last_affected":"7.3-update3"},{"introduced":"0"},{"last_affected":"7.3-update4"},{"introduced":"0"},{"last_affected":"7.3-update5"},{"introduced":"0"},{"last_affected":"7.3-update6"},{"introduced":"0"},{"last_affected":"7.3-update7"},{"introduced":"0"},{"last_affected":"7.4-update1"},{"introduced":"0"},{"last_affected":"7.4-update2"}]}}],"versions":["6.1.0-b1","6.1.0-b2","6.1.0-b3","6.1.0-b4","6.1.0-rc1","6.2.0-b1","6.2.0-b2","6.2.0-m2","6.2.0-m3","6.2.0-m4","6.2.0-m5","6.2.0-m6","7.0.0-m1","7.0.0-m2","7.0.0-m3","7.0.0-m4","7.0.0-m5","7.1.0-a1","7.1.0-a2","7.1.0-b1","7.1.0-b2","7.1.0-m1","7.1.0-m2","7.2.0-a1","7.2.0-b1","7.2.0-b2","7.2.0-b3","7.2.0-m2","7.3.0-ga1","7.3.1-ga2","7.3.2-ga3","7.3.3-ga4","7.3.4-ga5","7.3.5-ga6","7.3.6-ga7","7.3.7-ga8","7.4.0-ga1","7.4.1-ga2","7.4.2-ga3","sync-3.0.0-b1","sync-3.0.1-b2","sync-3.0.10-ga2","sync-3.0.2-b3","sync-3.0.3-b4","sync-3.0.4-b5","sync-3.0.5-b6","sync-3.0.6-b7","sync-3.0.7-b8","sync-3.0.8-b9","sync-3.0.9-ga1","sync-3.1.0-ga1","test-fix-pack-base-7310"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-3594.json","unresolved_ranges":[{"events":[{"introduced":"7.0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update11"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update12"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update13"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update14"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update15"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update16"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update17"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update19"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update20"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update21"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update22"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update23"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update24"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update25"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update8"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-update9"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update8"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update9"}]},{"events":[{"introduced":"7.0.0"},{"last_affected":"7.4.3.4"}]},{"events":[{"introduced":"0"},{"last_affected":"6.2-NA"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}