CVE-2022-42131
Description
Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module's REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing SSL certificate validation in Liferay's Dynamic Data Mapping REST data providers enables man-in-the-middle attacks on affected Portal and DXP versions.
Vulnerability
Overview
The Dynamic Data Mapping module's REST data providers in certain Liferay products fail to validate SSL certificates during HTTPS connections [1]. This missing validation affects Liferay Portal versions 7.1.0 through 7.4.2 and Liferay DXP versions 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3 [1]. The flaw resides in the module responsible for fetching external data via REST APIs, where the client does not verify the authenticity of the server's certificate.
Exploitation
Prerequisites
An attacker must be in a position to intercept network traffic between the affected Liferay instance and the external REST data provider [1]. This could be achieved through a man-in-the-middle (MITM) attack on the network path, such as on a compromised network segment or via DNS spoofing. No authentication is required to trigger the vulnerable functionality; any user or process that invokes a REST data provider is affected.
Impact
Successful exploitation allows an attacker to impersonate the legitimate REST data provider, potentially injecting malicious data into the Liferay system or exfiltrating sensitive information sent in requests [1]. The integrity and confidentiality of data exchanged through the Dynamic Data Mapping module are compromised, which could lead to further attacks depending on how the fetched data is used within the portal.
Mitigation
Liferay has addressed this vulnerability in the following releases: Liferay Portal 7.4.3 and later, Liferay DXP 7.1 fix pack 27, 7.2 fix pack 17, and 7.3 service pack 3 [1]. Users should upgrade to these fixed versions or apply the appropriate patches. No workaround is documented; enabling SSL certificate validation is inherent to the fix. The vendor's official site provides product information and update guidance [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.liferay.portal:release.portal.bomMaven | >= 7.1.0, < 7.4.3.4 | 7.4.3.4 |
Affected products
3- Liferay/Liferay Portaldescription
- osv-coords2 versions
>= 7.1.0, <= 7.1.0+ 1 more
- (no CPE)range: >= 7.1.0, <= 7.1.0
- (no CPE)range: >= 7.1.0, < 7.4.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.