This is an automated email from the ASF dual-hosted git repository.
gerlowskija pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/solr-site.git
The following commit(s) were added to refs/heads/main by this push:
new 0ba14aeb1 Adding CVE news entries for 9.10.1-resolved CVEs
0ba14aeb1 is described below
commit 0ba14aeb1768bd4d17cc07c480078228ec62c591
Author: Jason Gerlowski <[email protected]>
AuthorDate: Tue Jan 20 12:31:03 2026 -0500
Adding CVE news entries for 9.10.1-resolved CVEs
- CVE-2026-22022
- CVE-2026-22444
---
content/solr/security/2026-01-20-cve-2026-22022.md | 26 +++++++++++++++++++++
content/solr/security/2026-01-20-cve-2026-22444.md | 27 ++++++++++++++++++++++
2 files changed, 53 insertions(+)
diff --git a/content/solr/security/2026-01-20-cve-2026-22022.md
b/content/solr/security/2026-01-20-cve-2026-22022.md
new file mode 100644
index 000000000..221000990
--- /dev/null
+++ b/content/solr/security/2026-01-20-cve-2026-22022.md
@@ -0,0 +1,26 @@
+Title: CVE-2026-22022 - Unauthorized bypass of certain "predefined permission"
rules in the RuleBasedAuthorizationPlugin
+category: solr/security
+cve: CVE-2026-22022
+
+**Severity**
+moderate
+
+**Description**
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule
Based Authorization Plugin" are vulnerable to allowing unauthorized access to
certain Solr APIs, due to insufficiently strict input validation in those
components. Only deployments that meet all of the following criteria are
impacted by this vulnerability:
+
+1. Use of Solr's "RuleBasedAuthorizationPlugin"
+2. A RuleBasedAuthorizationPlugin config (see security.json) that specifies
multiple "roles"
+3. A RuleBasedAuthorizationPlugin permission list (see security.json) that
uses one or more of the following pre-defined permission rules: "config-read",
"config-edit", "schema-read", "metrics-read", or "security-read".
+4. A RuleBasedAuthorizationPlugin permission list that doesn't define the
"all" pre-defined permission
+5. A networking setup that allows clients to make unfiltered network requests
to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified
or restricted by any intervening proxy or gateway)
+
+**Mitigation**
+
+Users can mitigate this vulnerability by ensuring that their
RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined
permission and associates the permission with an "admin" or other privileged
role. Users can also upgrade to a Solr version outside of the impacted range,
such as the recently released Solr 9.10.1.
+
+**Credit**
+monkeontheroof (reporter)
+
+**References**
+JIRA - [SOLR-18054](https://issues.apache.org/jira/browse/SOLR-18054)
+CVE - [CVE-2026-22022](https://www.cve.org/CVERecord?id=CVE-2026-22022)
diff --git a/content/solr/security/2026-01-20-cve-2026-22444.md
b/content/solr/security/2026-01-20-cve-2026-22444.md
new file mode 100644
index 000000000..1c906e084
--- /dev/null
+++ b/content/solr/security/2026-01-20-cve-2026-22444.md
@@ -0,0 +1,27 @@
+Title: CVE-2026-22444 - Insufficient file-access checking in standalone
core-creation requests
+category: solr/security
+cve: CVE-2026-22444
+
+**Severity**
+moderate
+
+**Description**
+
+The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input
validation on some API parameters, which can cause Solr to check the existence
of and attempt to read file-system paths that should be disallowed by Solr's
"allowPaths" security setting. These read-only accesses can allow users to
create cores using unexpected configsets if any are accessible via the
filesystem. On Windows systems configured to allow UNC paths this can
additionally cause disclosure of NTLM " [...]
+
+Solr deployments are subject to this vulnerability if they meet the following
criteria:
+
+1. Solr is running in its "standalone" mode.
+2. Solr's "allowPath" setting is being used to restrict file access to certain
directories.
+3. Solr's "create core" API is exposed and accessible to untrusted users.
This can happen if Solr's RuleBasedAuthorizationPlugin is disabled, or if it is
enabled but the "core-admin-edit" predefined permission (or an equivalent
custom permission) is given to low-trust (i.e. non-admin) user roles.
+
+**Mitigation**
+
+Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if
disabled) and configuring a permission-list that prevents untrusted users from
creating new Solr cores. Users should also upgrade to Apache Solr 9.10.1 or
greater, which contain fixes for this issue.
+
+**Credit**
+Damon Toey (reporter)
+
+**References**
+JIRA - [SOLR-18058](https://issues.apache.org/jira/browse/SOLR-18058)
+CVE - [CVE-2026-22444](https://www.cve.org/CVERecord?id=CVE-2026-22444)