{"id":"CVE-2022-42114","details":"A Cross-site scripting (XSS) vulnerability in the Role module's edit role assignees page in Liferay Portal 7.4.0 through 7.4.3.36, and Liferay DXP 7.4 before update 37 allows remote attackers to inject arbitrary web script or HTML.","aliases":["GHSA-cmrw-cgfc-v6x2"],"modified":"2026-04-10T04:53:59.616151Z","published":"2022-10-18T21:15:16.287Z","references":[{"type":"WEB","url":"http://liferay.com"},{"type":"FIX","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42114"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/liferay/liferay-portal","events":[{"introduced":"0"},{"last_affected":"548f3899675d89749f92b7623d25e27d0c4691c7"},{"introduced":"0"},{"last_affected":"548f3899675d89749f92b7623d25e27d0c4691c7"},{"introduced":"0"},{"last_affected":"75354f3482d7c5edb70f4cd72ed8664ce8079842"},{"introduced":"ec84d86679146b84af526f96471a730c340dda78"},{"fixed":"6f67c755b09761bc6b98ea21ec63218f7f803efe"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.4-ga1"},{"introduced":"0"},{"last_affected":"7.4-update_1"},{"introduced":"0"},{"last_affected":"7.4-update_2"},{"introduced":"7.4.0"},{"fixed":"7.4.3.37"}]}}],"versions":["7.4.0-ga1","7.4.1-ga2","7.4.2-ga3","7.4.3.4-ga4","7.4.3.5-ga5","7.4.3.6-ga6","7.4.3.7-ga7"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_11"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_12"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_13"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_14"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_15"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_16"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_17"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_18"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_19"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_20"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_21"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_22"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_23"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_24"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_25"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_26"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_27"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_28"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_29"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_30"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_31"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_32"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_33"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_34"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_35"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_36"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_8"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4-update_9"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-42114.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}