{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T13:19:30.392","vulnerabilities":[{"cve":{"id":"CVE-2022-42124","sourceIdentifier":"cve@mitre.org","published":"2022-11-15T01:15:13.123","lastModified":"2025-09-05T18:15:37.193","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype."},{"lang":"es","value":"Vulnerabilidad ReDoS en LayoutPageTemplateEntryUpgradeProcess en Liferay Portal 7.3.2 hasta 7.4.3.4 y Liferay DXP 7.2 fix pack 9 hasta fix pack 18, 7.3 antes de la actualización 4 y DXP 7.4 GA permite a atacantes remotos consumir una cantidad excesiva de recursos del servidor a través de un payload manipulado inyectado en el campo 'nombre' de un prototipo de diseño."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1333"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-1333"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*","matchCriteriaId":"340DF1FE-5720-4516-BA51-F2197A654409"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*","matchCriteriaId":"97E155DE-05C6-4559-94A8-0EFEB958D0C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*","matchCriteriaId":"0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*","matchCriteriaId":"77523B76-FC26-41B1-A804-7372E13F4FB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*","matchCriteriaId":"B15397B8-5087-4239-AE78-D3C37D59DE83"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*","matchCriteriaId":"311EE92A-0EEF-4556-A52F-E6C9522FA2DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*","matchCriteriaId":"49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*","matchCriteriaId":"759DDB90-6A89-4E4F-BD04-F70EFA5343B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*","matchCriteriaId":"6F6A98ED-E694-4F39-95D0-C152BD1EC115"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*","matchCriteriaId":"96E84DBC-C740-4E23-8D1D-83C8AE49813E"},{"vulnerable":true,"criteria":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.2","versionEndExcluding":"7.4.3.5","matchCriteriaId":"C01C7D38-BC12-4921-ADE6-799945887D66"}]}]}],"references":[{"url":"http://liferay.com","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://issues.liferay.com/browse/LPE-17435","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://issues.liferay.com/browse/LPE-17535","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42124","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://liferay.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://issues.liferay.com/browse/LPE-17435","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://issues.liferay.com/browse/LPE-17535","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42124","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}