Liferay Portal 7.0.0 <= 7.0.6 / 7.1.0 <= 7.1.3 / 7.2.0 <= 7.2.1 / 7.3.0 < 7.3.1 Insufficient Verification

medium Nessus Plugin ID 176409


An application running on a remote web server host is affected by an insufficient verification vulnerability.


In Liferay Portal the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property '' should be set to true.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Liferay Portal 7.3.1 or later.

See Also

Plugin Details

Severity: Medium

ID: 176409

File Name: liferay_7_3_1_cve-2023-33949.nasl

Version: 1.0

Type: remote

Family: CGI abuses

Published: 5/26/2023

Updated: 5/26/2023

Configuration: Enable thorough checks

Risk Information


Risk Factor: Low

Score: 2.2


Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2023-33949


Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/a:liferay:liferay_portal

Required KB Items: installed_sw/liferay_portal

Patch Publication Date: 5/24/2023

Vulnerability Publication Date: 5/24/2023

Reference Information

CVE: CVE-2023-33949

IAVA: 2023-A-0267