CVE-2023-33945

The Time Bomb in the Schema: Liferay Upgrade SQL Injection

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 13, 2026·7 min read·3 visits

Executive Summary (TL;DR)

Liferay's upgrade tool for MS SQL Server trusts database metadata blindly. If an attacker can rename a Primary Key constraint to contain malicious SQL, the upgrade script—running with high privileges—will execute it. It's a classic 'Second-Order' SQL injection turned into a persistence time bomb.

A high-complexity but devastating SQL injection vulnerability in the Liferay Portal/DXP upgrade process allows attackers to plant malicious payloads in database metadata (primary keys), which are then executed with elevated privileges during system upgrades.

Technical Appendix

CVSS Score
6.4/ 10
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
EPSS Probability
0.28%
Top 49% most exploited

Affected Systems

Liferay Portal (7.3.1 - 7.4.3.17)Liferay DXP 7.3 (< Update 6)Liferay DXP 7.4 (< Update 18)Microsoft SQL Server (Database Backend)

Affected Versions Detail

Product
Affected Versions
Fixed Version
Liferay Portal
Liferay
>= 7.3.1, <= 7.4.3.177.4.3.18
Liferay DXP 7.3
Liferay
< Update 6Update 6
Liferay DXP 7.4
Liferay
< Update 18Update 18
AttributeDetail
CWE IDCWE-89 (Improper Neutralization of Special Elements in SQL Command)
Attack VectorNetwork (Context Dependent)
CVSS v3.16.4 (Medium)
ImpactCritical (RCE/DBA via Upgrade)
EPSS Score0.00282 (Low Probability)
Exploit StatusNo Public PoC / Weaponized Exploit
CWE-89
SQL Injection

The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

Vulnerability Timeline

Vulnerability Published in NVD
2023-05-24
Liferay Advisory Released
2023-05-24
NVD Record Updated
2024-10-22