CVE-2025-24814
January 27, 2025
In Apache Solr through 9.7, Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation
wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available
elsewhere on the filesystem. These replacement config files are treated as "trusted" and can use "<lib>" tags to add
to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin.
Affected Packages
org.apache.solr:solr-core (JAVA):
Affected version(s) >=1.3.0 <9.8.0Fix Suggestion:
Update to version 9.8.0Related Resources (9)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
UNREPORTED
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Execution with Unnecessary Privileges
EPSS
Base Score:
0.23