Security Patch - July 2025 - Jahia 8.1 Portlets
Vulnerability
A vulnerability was recently discovered in Jahia, exposing it to a risk of path traversal attack in its Portlets feature
Affected versions
- All versions up to and including 8.1.8.3
Versions of Jahia 8.2.0.0+ as well as Jahia versions released in or after July 2025 are not affected.
Addressing the vulnerability
If you are running Jahia 8.1+, the recommended method for addressing the vulnerability is to upgrade to serverSettings 9.7.4.
- Download serverSettings 9.7.4 from Jahia maven repository (MD5: 513feb2257f70e5c11eab568f81da959)
- Using Jahia module manager (or provisioning API), update it on your environment
Verifying the update
To verify the update, make sure serverSettings 9.7.4 is present and running. No previous versions of serverSettings should be present in your environment.
Mitigating the vulnerability
If you are running a previous version of Jahia below 8.1.0.0, or if the upgrade is impractical, the vulnerability can also be mitigated without upgrading serverSettings to 9.7.4 by blocking access to the following URL path: /cms/preparedportlets.
In HAProxy, this can be achieved with the following configuration:
acl url_forbidden_preparedportlets path_reg ^.*/.*cms.*/.*preparedportlets.*$
http-request deny if url_forbidden_preparedportlets