Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.solr/solr-core@9.9.0
Typemaven
Namespaceorg.apache.solr
Namesolr-core
Version9.9.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.10.1
Latest_non_vulnerable_version9.10.1
Affected_by_vulnerabilities
0
url VCID-3gq7-8e2z-yqcv
vulnerability_id VCID-3gq7-8e2z-yqcv
summary
Apache Solr: Unauthorized bypass of certain "predefined permission" rules in the RuleBasedAuthorizationPlugin
Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only deployments that meet all of the following criteria are impacted by this vulnerability:

  *  Use of Solr's "RuleBasedAuthorizationPlugin"
  *  A RuleBasedAuthorizationPlugin config (see security.json) that specifies multiple "roles"
  *  A RuleBasedAuthorizationPlugin permission list (see security.json) that uses one or more of the following pre-defined permission rules: "config-read", "config-edit", "schema-read", "metrics-read", or "security-read".
  *  A RuleBasedAuthorizationPlugin permission list that doesn't define the "all" pre-defined permission
  *  A networking setup that allows clients to make unfiltered network requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified or restricted by any intervening proxy or gateway)

Users can mitigate this vulnerability by ensuring that their RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined permission and associates the permission with an "admin" or other privileged role.  Users can also upgrade to a Solr version outside of the impacted range, such as the recently released Solr 9.10.1.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22022.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22022
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.4031
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40385
published_at 2026-04-18T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-16T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40369
published_at 2026-04-13T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40388
published_at 2026-04-12T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40426
published_at 2026-04-11T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40406
published_at 2026-04-09T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40394
published_at 2026-04-08T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40343
published_at 2026-04-07T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40419
published_at 2026-04-04T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40393
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22022
2
reference_url https://github.com/apache/solr
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/solr
3
reference_url https://github.com/apache/solr/commit/c135e6335c7158fa26e96b0dc386f825255b47c0
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/solr/commit/c135e6335c7158fa26e96b0dc386f825255b47c0
4
reference_url https://issues.apache.org/jira/browse/SOLR-18054
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/SOLR-18054
5
reference_url https://lists.apache.org/thread/d59hqbgo7p62myq7mgfpz7or8n1j7wbn
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:34:12Z/
url https://lists.apache.org/thread/d59hqbgo7p62myq7mgfpz7or8n1j7wbn
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22022
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22022
7
reference_url http://www.openwall.com/lists/oss-security/2026/01/20/4
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2026/01/20/4
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431603
reference_id 2431603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431603
9
reference_url https://github.com/advisories/GHSA-qr3p-2xj2-q7hq
reference_id GHSA-qr3p-2xj2-q7hq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qr3p-2xj2-q7hq
fixed_packages
0
url pkg:maven/org.apache.solr/solr-core@9.10.1
purl pkg:maven/org.apache.solr/solr-core@9.10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.solr/solr-core@9.10.1
aliases CVE-2026-22022, GHSA-qr3p-2xj2-q7hq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gq7-8e2z-yqcv
1
url VCID-418m-x1un-gufd
vulnerability_id VCID-418m-x1un-gufd
summary
Apache Solr: Insufficient file-access checking in standalone core-creation requests
The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr's  "allowPaths" security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM "user" hashes. 

Solr deployments are subject to this vulnerability if they meet the following criteria:
  *  Solr is running in its "standalone" mode.
  *  Solr's "allowPath" setting is being used to restrict file access to certain directories.
  *  Solr's "create core" API is exposed and accessible to untrusted users.  This can happen if Solr's  RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html  is disabled, or if it is enabled but the "core-admin-edit" predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles.

Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22444.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22444
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08778
published_at 2026-04-21T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08718
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08766
published_at 2026-04-04T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08692
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08767
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08794
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08795
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08763
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08748
published_at 2026-04-13T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08636
published_at 2026-04-16T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22444
2
reference_url https://github.com/apache/solr
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/solr
3
reference_url https://issues.apache.org/jira/browse/SOLR-18058
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/SOLR-18058
4
reference_url https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:38:26Z/
url https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22444
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22444
6
reference_url http://www.openwall.com/lists/oss-security/2026/01/20/5
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2026/01/20/5
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431604
reference_id 2431604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431604
8
reference_url https://github.com/advisories/GHSA-vc2w-4v3p-2mqw
reference_id GHSA-vc2w-4v3p-2mqw
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vc2w-4v3p-2mqw
fixed_packages
0
url pkg:maven/org.apache.solr/solr-core@9.10.1
purl pkg:maven/org.apache.solr/solr-core@9.10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.solr/solr-core@9.10.1
aliases CVE-2026-22444, GHSA-vc2w-4v3p-2mqw
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-418m-x1un-gufd
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.solr/solr-core@9.9.0