Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.solr/solr-core
  4. ›
  5. CVE-2026-22444

CVE-2026-22444: Apache Solr: Insufficient file-access checking in standalone core-creation requests

January 21, 2026

The “create core” API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr’s “allowPaths” security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM “user” hashes.

Solr deployments are subject to this vulnerability if they meet the following criteria:

  • Solr is running in its “standalone” mode.
  • Solr’s “allowPath” setting is being used to restrict file access to certain directories.
  • Solr’s “create core” API is exposed and accessible to untrusted users.  This can happen if Solr’s RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html is disabled, or if it is enabled but the “core-admin-edit” predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles.

Users can mitigate this by enabling Solr’s RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue.

References

  • github.com/advisories/GHSA-vc2w-4v3p-2mqw
  • github.com/apache/solr
  • issues.apache.org/jira/browse/SOLR-18058
  • lists.apache.org/thread/qkrb9dd4xrlqmmq73lrhkbfkttto2d1m
  • nvd.nist.gov/vuln/detail/CVE-2026-22444

Code Behaviors & Features

Detect and mitigate CVE-2026-22444 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 8.6.0 before 9.10.1

Fixed versions

  • 9.10.1

Solution

Upgrade to version 9.10.1 or above.

Impact 7.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

maven/org.apache.solr/solr-core/CVE-2026-22444.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:29 +0000.