Legacy Knowledge Base
Published Jun. 30, 2025

Will a curl vulnerability impact Liferay DXP?

Written By

Adrienne Lao

How To articles are not official guidelines or officially supported documentation. They are community-contributed content and may not always reflect the latest updates to Liferay DXP. We welcome your feedback to improve How To articles!

While we make every effort to ensure this Knowledge Base is accurate, it may not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with any feedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack" publication program, made available for informational purposes. Articles in this program were published without a requirement for independent editing or verification and are provided"as is" without guarantee.

Before using any information from this article, independently verify its suitability for your situation and project.

Issue

  • There have been security announcements that are deemed to be a high-risk vulnerability that is caused by curl 8.4.0.  

Environment

  • DXP 7.3

Resolution

  • Liferay DXP does not use the libcurl library. In conclusion, Liferay DXP is not vulnerable to this type of curl security vulnerability. 
  • Liferay DXP Docker Images do however contain the affected curl libraries, included as a part of Ubuntu. Liferay DXP or scripts within the image do not call curl with any of the affected options or environment variables.

Additional Information

  • You may read about if your version of Docker Images is affected here, CVE-2023-38545 curl: SOCKS5 heap buffer overflow. There have been newer released versions of Docker Images (d5.0.47 or newer) that have addressed this existing vulnerability.

 

 

Did this article resolve your issue ?

Legacy Knowledge Base