Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.solr/solr-core@8.11.0
purl pkg:maven/org.apache.solr/solr-core@8.11.0
Next non-vulnerable version 9.10.1
Latest non-vulnerable version 9.10.1
Risk 10.0
Vulnerabilities affecting this package (10)
Vulnerability Summary Fixed by
VCID-3gq7-8e2z-yqcv
Aliases:
CVE-2026-22022
GHSA-qr3p-2xj2-q7hq
Apache Solr: Unauthorized bypass of certain "predefined permission" rules in the RuleBasedAuthorizationPlugin Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only deployments that meet all of the following criteria are impacted by this vulnerability: * Use of Solr's "RuleBasedAuthorizationPlugin" * A RuleBasedAuthorizationPlugin config (see security.json) that specifies multiple "roles" * A RuleBasedAuthorizationPlugin permission list (see security.json) that uses one or more of the following pre-defined permission rules: "config-read", "config-edit", "schema-read", "metrics-read", or "security-read". * A RuleBasedAuthorizationPlugin permission list that doesn't define the "all" pre-defined permission * A networking setup that allows clients to make unfiltered network requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified or restricted by any intervening proxy or gateway) Users can mitigate this vulnerability by ensuring that their RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined permission and associates the permission with an "admin" or other privileged role.  Users can also upgrade to a Solr version outside of the impacted range, such as the recently released Solr 9.10.1.
9.10.1
Affected by 0 other vulnerabilities.
VCID-418m-x1un-gufd
Aliases:
CVE-2026-22444
GHSA-vc2w-4v3p-2mqw
Apache Solr: Insufficient file-access checking in standalone core-creation requests The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr's "allowPaths" security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM "user" hashes.  Solr deployments are subject to this vulnerability if they meet the following criteria: * Solr is running in its "standalone" mode. * Solr's "allowPath" setting is being used to restrict file access to certain directories. * Solr's "create core" API is exposed and accessible to untrusted users.  This can happen if Solr's RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html is disabled, or if it is enabled but the "core-admin-edit" predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles. Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue.
9.10.1
Affected by 0 other vulnerabilities.
VCID-5781-s1ny-q7ey
Aliases:
CVE-2023-44487
GHSA-2m7v-gc89-fjqf
GHSA-qppj-fm5r-hxr3
GHSA-vx74-f528-fxqg
GHSA-xpw8-rcwv-8f8p
GMS-2023-3377
VSV00013
9.4.0
Affected by 6 other vulnerabilities.
VCID-a4yf-9j54-e3cp
Aliases:
CVE-2021-44548
GHSA-pccr-q7v9-5f27
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr This issue only affects Windows.
8.11.1
Affected by 9 other vulnerabilities.
VCID-hpys-9ncu-3bgv
Aliases:
CVE-2023-50386
GHSA-37vr-vmg4-jwpw
Apache Solr: Backup/Restore APIs allow for deployment of executables in malicious ConfigSets Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API. When backing up Solr Collections, these configSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups). If the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted. When Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries. Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue. In these versions, the following protections have been added: * Users are no longer able to upload files to a configSet that could be executed via a Java ClassLoader. * The Backup API restricts saving backups to directories that are used in the ClassLoader.
8.11.3
Affected by 5 other vulnerabilities.
9.4.1
Affected by 4 other vulnerabilities.
VCID-jc41-ky5q-tkhv
Aliases:
CVE-2023-50291
GHSA-3hwc-rqwp-v36q
Apache Solr can leak certain passwords due to System Property redaction logic inconsistencies Insufficiently Protected Credentials vulnerability in Apache Solr. This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0. One of the two endpoints that publishes the Solr process' Java system properties, /admin/info/properties, was only setup to hide system properties that had "password" contained in the name. There are a number of sensitive system properties, such as "basicauth" and "aws.secretKey" do not contain "password", thus their values were published via the "/admin/info/properties" endpoint. This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI. This /admin/info/properties endpoint is protected under the "config-read" permission. Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the "config-read" permission. Users are recommended to upgrade to version 9.3.0 or 8.11.3, both of which fix the issue. A single option now controls hiding Java system property for all endpoints, "-Dsolr.hiddenSysProps". By default all known sensitive properties are hidden (including "-Dbasicauth"), as well as any property with a name containing "secret" or "password". Users who cannot upgrade can also use the following Java system property to fix the issue:   `-Dsolr.redaction.system.pattern=.*(password|secret|basicauth).*`
8.11.3
Affected by 5 other vulnerabilities.
9.3.0
Affected by 7 other vulnerabilities.
VCID-qkt3-eevh-ekcr
Aliases:
CVE-2023-50292
GHSA-4wxw-42wx-2wfx
Apache Solr Schema Designer blindly "trusts" all configsets Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr. This issue affects Apache Solr from 8.10.0 through 8.11.2, from 9.0.0 before 9.3.0. The Schema Designer was introduced to allow users to more easily configure and test new Schemas and configSets. However, when the feature was created, the "trust" (authentication) of these configSets was not considered. External library loading is only available to configSets that are "trusted" (created by authenticated users), thus non-authenticated users are unable to perform Remote Code Execution. Since the Schema Designer loaded configSets without taking their "trust" into account, configSets that were created by unauthenticated users were allowed to load external libraries when used in the Schema Designer. Users are recommended to upgrade to version 9.3.0 or 8.11.3, both of which fix the issue.
8.11.3
Affected by 5 other vulnerabilities.
9.3.0
Affected by 7 other vulnerabilities.
VCID-t4p6-84y8-kbbu
Aliases:
CVE-2023-50298
GHSA-xrj7-x7gp-wwqr
Apache Solr's Streaming Expressions allow users to extract data from other Solr Clouds Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. Solr Streaming Expressions allows users to extract data from other Solr Clouds, using a "zkHost" parameter. When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they will be sent to whatever "zkHost" the user provides. An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper requests with credentials and ACLs and extracts the sensitive information, then send a streaming expression using the mock server's address in "zkHost". Streaming Expressions are exposed via the "/streaming" handler, with "read" permissions. Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue. From these versions on, only zkHost values that have the same server address (regardless of chroot), will use the given ZooKeeper credentials and ACLs when connecting.
8.11.3
Affected by 5 other vulnerabilities.
9.4.1
Affected by 4 other vulnerabilities.
VCID-uaxq-nmwp-5uct
Aliases:
CVE-2024-52012
GHSA-4p5m-gvpf-f3x5
Apache Solr Relative Path Traversal vulnerability Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
9.8.0
Affected by 2 other vulnerabilities.
VCID-v5ka-6bd4-33ft
Aliases:
CVE-2025-24814
GHSA-68r2-fwcg-qpm8
Apache Solr vulnerable to Execution with Unnecessary Privileges Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default.
9.8.0
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-17T00:11:18.287395+00:00 GitLab Importer Affected by VCID-3gq7-8e2z-yqcv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2026-22022.yml 38.4.0
2026-04-17T00:11:06.481544+00:00 GitLab Importer Affected by VCID-418m-x1un-gufd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2026-22444.yml 38.4.0
2026-04-16T23:19:29.330619+00:00 GitLab Importer Affected by VCID-v5ka-6bd4-33ft https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2025-24814.yml 38.4.0
2026-04-16T23:19:28.361624+00:00 GitLab Importer Affected by VCID-uaxq-nmwp-5uct https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2024-52012.yml 38.4.0
2026-04-16T22:50:27.385847+00:00 GitLab Importer Affected by VCID-qkt3-eevh-ekcr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50292.yml 38.4.0
2026-04-16T22:50:27.219796+00:00 GitLab Importer Affected by VCID-jc41-ky5q-tkhv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50291.yml 38.4.0
2026-04-16T22:50:25.421258+00:00 GitLab Importer Affected by VCID-hpys-9ncu-3bgv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50386.yml 38.4.0
2026-04-16T22:50:21.453252+00:00 GitLab Importer Affected by VCID-t4p6-84y8-kbbu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50298.yml 38.4.0
2026-04-16T22:40:24.332115+00:00 GitLab Importer Affected by VCID-5781-s1ny-q7ey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-44487.yml 38.4.0
2026-04-16T21:36:48.387943+00:00 GitLab Importer Affected by VCID-a4yf-9j54-e3cp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2021-44548.yml 38.4.0
2026-04-12T01:35:06.118411+00:00 GitLab Importer Affected by VCID-3gq7-8e2z-yqcv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2026-22022.yml 38.3.0
2026-04-12T01:34:53.715750+00:00 GitLab Importer Affected by VCID-418m-x1un-gufd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2026-22444.yml 38.3.0
2026-04-12T00:38:19.466877+00:00 GitLab Importer Affected by VCID-v5ka-6bd4-33ft https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2025-24814.yml 38.3.0
2026-04-12T00:38:18.583940+00:00 GitLab Importer Affected by VCID-uaxq-nmwp-5uct https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2024-52012.yml 38.3.0
2026-04-12T00:09:56.282936+00:00 GitLab Importer Affected by VCID-qkt3-eevh-ekcr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50292.yml 38.3.0
2026-04-12T00:09:56.138443+00:00 GitLab Importer Affected by VCID-jc41-ky5q-tkhv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50291.yml 38.3.0
2026-04-12T00:09:54.871273+00:00 GitLab Importer Affected by VCID-hpys-9ncu-3bgv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50386.yml 38.3.0
2026-04-12T00:09:52.248606+00:00 GitLab Importer Affected by VCID-t4p6-84y8-kbbu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50298.yml 38.3.0
2026-04-11T23:59:51.752036+00:00 GitLab Importer Affected by VCID-5781-s1ny-q7ey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-44487.yml 38.3.0
2026-04-11T22:50:42.201601+00:00 GitLab Importer Affected by VCID-a4yf-9j54-e3cp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2021-44548.yml 38.3.0
2026-04-03T01:44:07.479485+00:00 GitLab Importer Affected by VCID-3gq7-8e2z-yqcv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2026-22022.yml 38.1.0
2026-04-03T01:43:52.925357+00:00 GitLab Importer Affected by VCID-418m-x1un-gufd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2026-22444.yml 38.1.0
2026-04-03T00:46:16.764734+00:00 GitLab Importer Affected by VCID-v5ka-6bd4-33ft https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2025-24814.yml 38.1.0
2026-04-03T00:46:15.783050+00:00 GitLab Importer Affected by VCID-uaxq-nmwp-5uct https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2024-52012.yml 38.1.0
2026-04-03T00:15:01.402266+00:00 GitLab Importer Affected by VCID-qkt3-eevh-ekcr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50292.yml 38.1.0
2026-04-03T00:15:01.232713+00:00 GitLab Importer Affected by VCID-jc41-ky5q-tkhv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50291.yml 38.1.0
2026-04-03T00:14:59.041181+00:00 GitLab Importer Affected by VCID-hpys-9ncu-3bgv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50386.yml 38.1.0
2026-04-03T00:14:54.693518+00:00 GitLab Importer Affected by VCID-t4p6-84y8-kbbu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-50298.yml 38.1.0
2026-04-03T00:02:55.316507+00:00 GitLab Importer Affected by VCID-5781-s1ny-q7ey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2023-44487.yml 38.1.0
2026-04-02T23:00:04.763006+00:00 GitLab Importer Affected by VCID-a4yf-9j54-e3cp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2021-44548.yml 38.1.0
2026-04-01T17:18:49.658245+00:00 GitLab Importer Affected by VCID-a4yf-9j54-e3cp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.solr/solr-core/CVE-2021-44548.yml 38.0.0