Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-418m-x1un-gufd
Vulnerability ID VCID-418m-x1un-gufd
Aliases CVE-2026-22444
GHSA-vc2w-4v3p-2mqw
Summary Apache Solr: Insufficient file-access checking in standalone core-creation requests The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr's "allowPaths" security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM "user" hashes.  Solr deployments are subject to this vulnerability if they meet the following criteria: * Solr is running in its "standalone" mode. * Solr's "allowPath" setting is being used to restrict file access to certain directories. * Solr's "create core" API is exposed and accessible to untrusted users.  This can happen if Solr's RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html is disabled, or if it is enabled but the "core-admin-edit" predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles. Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22444.json
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-22444
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-vc2w-4v3p-2mqw
cvssv3.1 7.1 https://github.com/apache/solr
generic_textual HIGH https://github.com/apache/solr
cvssv3.1 7.1 https://issues.apache.org/jira/browse/SOLR-18058
generic_textual HIGH https://issues.apache.org/jira/browse/SOLR-18058
cvssv3.1 7.1 https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
generic_textual HIGH https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
ssvc Track https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
cvssv3.1 7.1 https://nvd.nist.gov/vuln/detail/CVE-2026-22444
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2026-22444
cvssv3.1 7.1 http://www.openwall.com/lists/oss-security/2026/01/20/5
generic_textual HIGH http://www.openwall.com/lists/oss-security/2026/01/20/5
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22444.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/apache/solr
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://issues.apache.org/jira/browse/SOLR-18058
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:38:26Z/ Found at https://lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2026-22444
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N Found at http://www.openwall.com/lists/oss-security/2026/01/20/5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.08718
EPSS Score 0.00031
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:52:22.881559+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-vc2w-4v3p-2mqw/GHSA-vc2w-4v3p-2mqw.json 38.0.0