Security

Voltar para Security Alert

Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2025-25009, CVE-2025-25017, CVE-2025-25018, CVE-2025-37727

The following issues may affect your Liferay-Elastic stack.

Vulnerability Information

 

CVE Severity Summary Affected Product Affected Versions Solutions & Mitigations
CVE-2025-37727 CVSSv3.1: Medium(5.3) Elasticsearch Insertion of sensitive information in log file (ESA-2025-18) Elasticsearch

7.x: All versions from 7.0.0 and up to and including 7.17.29

8.x: All versions from 8.0.0 and up to and including 8.18.7

8.19.x: All versions from 8.19.0 and up to and including 8.19.4

The issue is resolved in version 8.18.8, 8.19.5. Learn more.
CVE-2025-25009 CVSSv3.1: 8.7 (High) Kibana Cross-Site Scripting (XSS) (ESA-2025-20) Kibana

7.x: All versions prior to and including 7.17.29

8.x: All versions from 8.0.0 up to and including 8.18.7

8.19.x: All versions from 8.19.0 up to and including 8.19.4

Users should upgrade to the versions below or later: 8.18.88.19.5. Learn more.

CVE-2025-25017 CVSSv3.1: 8.2 (High)  Kibana Cross-Site-Scripting (XSS) (ESA-2025-16) Kibana

7.x: All versions from 7.0.0 and up to and including 7.17.29


8.x: All versions from 8.0.0 and up to and including 8.18.7

8.19.x: All versions from 8.19.0 and up to and including 8.19.3

Users should upgrade to version 8.18.8 or 8.19.4. Learn more.
CVE-2025-25018 CVSSv3.1: High (8.7) Kibana Stored Cross-Site-Scripting(XSS) (ESA-2025-17) Kibana

7.x: All versions from 7.0.0 and up to and including 7.17.29


8.x: All versions from 8.0.0 and up to and including 8.18.7


8.19.x: All versions from 8.19.0 and up to and including 8.19.4

Users should upgrade to version 8.18.8 or 8.19.5. Learn more.

 

Regarding CVE-2025-37727: Since the Sidecar Elasticsearch server has both X-Pack Security and audit logging disabled, the necessary preconditions for this vulnerability are not met. Therefore, local and test-only Liferay DXP environments utilizing the Sidecar Elasticsearch runtime are unaffected by CVE-2025-37727.

The Elastic Stack versions 7.x has reached end-of-maintenance on April 15, 2025 and will reach end-of-life on January 15, 2026. Learn more.

Additional Information

General note on CVEs affecting Elasticsearch

The Elasticsearch server runtime included in Liferay DXP Tomcat Bundles and Docker Images (aka. Sidecar Elasticsearch, located under [Liferay-Home]/elasticsearch-sidecar) is neither suitable nor supported for production. It is provided as a convenience for local development and testing only. Instead, configure Liferay to connect to Elasticsearch as a self-managed, standalone server or cluster of server nodes. 

The Sidecar Elasticsearch (including all of its bundled plugins and libraries) cannot be patched or updated through Liferay hotfixes. Liferay does not possess additional vulnerability and exploitability information beyond that provided in public security alerts by Elastic. Security scans can report false-positive vulnerabilities when analyzing the Liferay DXP Tomcat Bundles or Docker images because of the inclusion of the Sidecar Elasticsearch runtime. The -slim version of the Liferay DXP Docker images does not include the Sidecar Elasticsearch runtime. 

Vulnerabilities in Elasticsearch can only be addressed with new releases by Elastic. The compatible Elasticsearch versions and the Sidecar Elasticsearch version is updated periodically with newer Liferay DXP Quarterly Releases. Customers are advised to update their production Elasticsearch installations to the latest compatible versions. 

Additionally, since using Elasticsearch Sidecar in production is not supported, users can simply delete the elasticsearch-sidecar directory to remove these vulnerable modules from the bundle. Example commands for 2024.q3.13 release:

The -slim Liferay DXP Docker images do not include the Sidecar Elasticsearch runtime. 

General note on CVEs affecting Kibana

Liferay DXP and the Liferay Enterprise Search Monitoring application which integrates Kibana's UI as a proxy into Liferay DXP, do not include the binaries of the Kibana application itself. It is not possible to patch or update Kibana through the installation of Liferay hotfixes or upgrading to newer quarterly releases. In addition, Liferay does not have further information about the vulnerabilities and their exploit-ability beyond what's shared in the public security alerts issued by the vendor (Elastic).

Vulnerabilities in Kibana can only be addressed with new releases by Elastic. Customers are advised to update their Elasticsearch and Kibana installations to the latest compatible versions.

Search Engine Compatibility

Liferay recommends that customers upgrade their production Elastic Stack to the latest available and compatible version. Reference the information here for the detailed Elasticsearch compatibility including the compatible connector versions and required quarterly release/update versions and patch levels.


Elastic, Elasticsearch, Kibana and X-Pack are trademarks of Elasticsearch BV, registered in the U.S. and in other countries.

On this page