{"id":"CVE-2022-42118","details":"A Cross-site scripting (XSS) vulnerability in the Portal Search module in Liferay Portal 7.1.0 through 7.4.2, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 15, and 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the `tag` parameter.","aliases":["GHSA-mr77-4pm4-x9vm"],"modified":"2026-04-10T04:54:00.701940Z","published":"2022-11-15T01:15:12.410Z","references":[{"type":"ADVISORY","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42118"},{"type":"ADVISORY","url":"http://liferay.com"},{"type":"ADVISORY","url":"https://issues.liferay.com/browse/LPE-17342"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/liferay/liferay-portal","events":[{"introduced":"0"},{"last_affected":"75354f3482d7c5edb70f4cd72ed8664ce8079842"},{"introduced":"0"},{"last_affected":"59148a8775a2b2345694a023683d95b478c483c6"},{"introduced":"0"},{"last_affected":"0ac7dd652f3cac9b7880e6dea92912b2d02dca3a"},{"introduced":"0"},{"last_affected":"a3f823cf755fcf3660cd6c2c334840e9596ced9e"},{"introduced":"0"},{"last_affected":"ded0e9390637985231e962e4ad4cfa4639eabb26"},{"introduced":"0"},{"last_affected":"4ffdd7225ef4a5fd922703263a3006a741a4d8d0"},{"introduced":"0"},{"last_affected":"0515646c8f638f202d107469cc147172fc7685de"}],"database_specific":{"versions":[{"introduced":"7.1.0"},{"last_affected":"7.4.2"},{"introduced":"0"},{"last_affected":"7.1-fix_pack_1"},{"introduced":"0"},{"last_affected":"7.1-fix_pack_2"},{"introduced":"0"},{"last_affected":"7.1-fix_pack_3"},{"introduced":"0"},{"last_affected":"7.2-fix_pack_1"},{"introduced":"0"},{"last_affected":"7.3-sp1"},{"introduced":"0"},{"last_affected":"7.3-sp2"}]}}],"versions":["6.1.0-b1","6.1.0-b2","6.1.0-b3","6.1.0-b4","6.1.0-rc1","6.2.0-b1","6.2.0-b2","6.2.0-m2","6.2.0-m3","6.2.0-m4","6.2.0-m5","6.2.0-m6","7.0.0-m1","7.0.0-m2","7.0.0-m3","7.0.0-m4","7.0.0-m5","7.1.0-a1","7.1.0-a2","7.1.0-b1","7.1.0-b2","7.1.0-ga1","7.1.0-m1","7.1.0-m2","7.1.0-rc1","7.1.1-ga2","7.1.2-ga3","7.1.3-ga4","7.2.0-a1","7.2.0-b1","7.2.0-b2","7.2.0-b3","7.2.0-ga1","7.2.0-m2","7.2.0-rc2","7.2.0-rc3","7.2.1-ga2","7.3.0-ga1","7.3.1-ga2","7.3.2-ga3","7.3.3-ga4","7.3.4-ga5","7.3.5-ga6","7.4.0-ga1","7.4.1-ga2","7.4.2-ga3","sync-3.0.0-b1","sync-3.0.1-b2","sync-3.0.10-ga2","sync-3.0.2-b3","sync-3.0.3-b4","sync-3.0.4-b5","sync-3.0.5-b6","sync-3.0.6-b7","sync-3.0.7-b8","sync-3.0.8-b9","sync-3.0.9-ga1","sync-3.1.0-ga1","test-fix-pack-base-7310"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-42118.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.1-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_11"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_12"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_13"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_14"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_15"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_16"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_17"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_18"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_19"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_20"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_21"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_22"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_23"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_24"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_25"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_8"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1-fix_pack_9"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_11"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_12"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_13"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_14"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_8"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2-fix_pack_9"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-NA"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}