CVE-2020-7961
Java vulnerability analysis and mitigation

Overview

Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). The vulnerability was discovered in 2020 and assigned CVE-2020-7961. This critical vulnerability affects Liferay Portal Community Edition versions up to 7.2.0 (NVD, CVE).

Technical details

The vulnerability is a Java unmarshalling vulnerability via JSONWS in Liferay Portal. Marshalling, which is similar to serialization, is used for communication with remote objects. The vulnerability allows attackers to provide a malicious object that, when unmarshalled, enables remote code execution. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating it is network-accessible, requires low complexity to exploit, needs no privileges or user interaction, and can result in high impact to confidentiality, integrity, and availability (NVD).

Impact

The vulnerability allows attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise. Successful exploitation can enable attackers to use compromised systems for crypto-mining, lateral movement across company networks, or launching attacks on external targets while masquerading as the compromised company (CheckPoint Research).

Mitigation and workarounds

Organizations should upgrade to Liferay Portal version 7.2.1 CE GA2 or later to address this vulnerability. The vulnerability has been patched in this version, and upgrading is the primary recommended mitigation strategy (NVD).

Community reactions

The vulnerability has gained significant attention due to its inclusion in CISA's Known Exploited Vulnerabilities Catalog. CISA has mandated federal agencies to address this vulnerability by May 3, 2022, highlighting its severity and active exploitation in the wild (NVD).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-58057MEDIUM6.9
  • JavaJava
  • infinispan-15.2
NoYesSep 04, 2025
CVE-2025-58369MEDIUM5.3
  • JavaJava
  • co.fs2:fs2-io_3
NoYesSep 05, 2025
GHSA-c7v7-rqfm-f44jMEDIUM5.3
  • JavaJava
  • com.vaadin:vaadin
NoYesSep 04, 2025
GHSA-94g8-xv23-7656MEDIUM5.3
  • JavaJava
  • com.vaadin:vaadin-upload-flow
NoYesSep 04, 2025
CVE-2025-9467MEDIUM5.3
  • JavaJava
  • com.vaadin:vaadin-server
NoYesSep 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management