Known Vulnerabilities

The following vulnerabilities are known to exist in Liferay Portal CE.  Users of older releases are strongly encouraged to upgrade to the latest Liferay Portal CE release.  Patches are only produced for the latest Liferay Portal CE release.  Source code modifications may be possible on older releases, but care must be taken to backport fixes that may not apply to older releases.

To obtain source or binary patches for each of the vulnerabilities, click on the name of the vulnerability, and look for links for source and binary patches.  To obtain a single cumulative source or binary patch for all known vulnerabilities, visit the Patch Details section of the Reporting page.  Note that the availability of the single cumulative binary patch may lag a day or two behind availability of the associated source patches.


CST-7052 Multiple CSRF vulnerability in 7.0 CE GA6


Tue, 29 May 2018 04:00:00 +0000


CST-7052 Multiple CSRF vulnerability in 7.0 CE GA6


Multiple cross-site request forgery (CSRF) vulnerabilities allow remote attackers to execute unwanted actions in the portal.


Severity 2


Remove the following lines from the 'auth.token.ignore.actions' portal property:


Removing the above paths will disable the following features:

  • Blog entry drafts and Wiki page drafts will no longer be automatically saved when the user's session expires
  • Unauthenticated users will no longer be able to add a message in the Message Boards or add comments in the various apps that support comments.

To keep using these features, the above paths must be re-added after upgrading to a patched version of the portal.


There is no patch available for Liferay Portal 7.0 CE GA6. Instead, users should upgrade to Liferay Portal 7.0 CE GA7 (7.0.6) or later to fix this issue.


Marko Winkler