This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 3f35be581 Commit build products
3f35be581 is described below

commit 3f35be58172376ccc16eeb9ee7f3396b3a95e6e2
Author: Build Pelican (action) <[email protected]>
AuthorDate: Tue Jan 20 17:32:17 2026 +0000

    Commit build products
---
 output/feeds/all.atom.xml           | 110 +++++++++++++---------------------
 output/feeds/solr/security.atom.xml |  41 ++++++++++++-
 output/index.html                   |   2 +-
 output/news.html                    |  41 +++++++++++++
 output/operator/index.html          |   2 +-
 output/security.html                | 116 ++++++++++++++++--------------------
 6 files changed, 177 insertions(+), 135 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 9eae0606a..9a0dfec65 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -15,7 +15,46 @@
 &lt;p&gt;Please refer to the Upgrade Notes in the Solr Ref Guide for 
information on upgrading from previous Solr versions:&lt;/p&gt;
 &lt;p&gt;&lt;a 
href="https://solr.apache.org/guide/solr/9_10/upgrade-notes/solr-upgrade-notes.html"&gt;https://solr.apache.org/guide/solr/9_10/upgrade-notes/solr-upgrade-notes.html&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;Please read CHANGELOG.md for a full list of bugfixes:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://solr.apache.org/9_10_1/changes/Changes.html"&gt;https://solr.apache.org/9_10_1/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"/></entry><entry><title>CVE-2025-66516: Apache Solr extraction 
module vulnerable to XXE attacks via XFA content in PDFs</title><link 
href="/cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs.html"
 rel="alternate"/><published>2025-12-09T00:00:00+00:00</published><u [...]
+&lt;p&gt;&lt;a 
href="https://solr.apache.org/9_10_1/changes/Changes.html"&gt;https://solr.apache.org/9_10_1/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"/></entry><entry><title>CVE-2026-22022 - Unauthorized bypass 
of certain "predefined permission" rules in the 
RuleBasedAuthorizationPlugin</title><link 
href="/cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin.html"
 rel="alternate"/><published>2026-0 [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule 
Based Authorization Plugin" are vulnerable to allowing unauthorized access to 
certain Solr APIs, due to insufficiently strict input validation in those 
components.  Only deployments that meet all of the following criteria 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule 
Based Authorization Plugin" are vulnerable to allowing unauthorized access to 
certain Solr APIs, due to insufficiently strict input validation in those 
components.  Only deployments that meet all of the following criteria are 
impacted by this vulnerability:&lt;/p&gt;
+&lt;ol&gt;
+&lt;li&gt;Use of Solr's "RuleBasedAuthorizationPlugin"&lt;/li&gt;
+&lt;li&gt;A RuleBasedAuthorizationPlugin config (see security.json) that 
specifies multiple "roles"&lt;/li&gt;
+&lt;li&gt;A RuleBasedAuthorizationPlugin permission list (see security.json) 
that uses one or more of the following pre-defined permission rules: 
"config-read", "config-edit", "schema-read", "metrics-read", or 
"security-read".&lt;/li&gt;
+&lt;li&gt;A RuleBasedAuthorizationPlugin permission list that doesn't define 
the "all" pre-defined permission&lt;/li&gt;
+&lt;li&gt;A networking setup that allows clients to make unfiltered network 
requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, 
unmodified or restricted by any intervening proxy or gateway)&lt;/li&gt;
+&lt;/ol&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users can mitigate this vulnerability by ensuring that their 
RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined 
permission and associates the permission with an "admin" or other privileged 
role.  Users can also upgrade to a Solr version outside of the impacted range, 
such as the recently released Solr 9.10.1.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+monkeontheroof (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-18054"&gt;SOLR-18054&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22022"&gt;CVE-2026-22022&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"/></entry><entry><title>CVE-2026-22444 - Insufficient 
file-access checking in standalone core-creation requests</title><link 
href="/cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests.html"
 
rel="alternate"/><published>2026-01-20T00:00:00+00:00</published><updated>2026-01-20T00:00:00+00:00</updated><author><name>S
 [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;The "create core" API of Apache Solr 8.6 through 9.10.0 lacks 
sufficient input validation on some API parameters, which can cause Solr to 
check the existence of and attempt to read file-system paths that should be 
disallowed by Solr's "allowPaths" security setting.  These read-only 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;The "create core" API of Apache Solr 8.6 through 9.10.0 lacks 
sufficient input validation on some API parameters, which can cause Solr to 
check the existence of and attempt to read file-system paths that should be 
disallowed by Solr's "allowPaths" security setting.  These read-only accesses 
can allow users to create cores using unexpected configsets if any are 
accessible via the filesystem.  On Windows systems configured to allow UNC 
paths this can additionally cause disclosure  [...]
+&lt;p&gt;Solr deployments are subject to this vulnerability if they meet the 
following criteria:&lt;/p&gt;
+&lt;ol&gt;
+&lt;li&gt;Solr is running in its "standalone" mode.&lt;/li&gt;
+&lt;li&gt;Solr's "allowPath" setting is being used to restrict file access to 
certain directories.&lt;/li&gt;
+&lt;li&gt;Solr's "create core" API is exposed and accessible to untrusted 
users.  This can happen if Solr's RuleBasedAuthorizationPlugin is disabled, or 
if it is enabled but the "core-admin-edit" predefined permission (or an 
equivalent custom permission) is given to low-trust (i.e. non-admin) user 
roles.&lt;/li&gt;
+&lt;/ol&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users can mitigate this by enabling Solr's 
RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list 
that prevents untrusted users from creating new Solr cores.  Users should also 
upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this 
issue.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+Damon Toey (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-18058"&gt;SOLR-18058&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22444"&gt;CVE-2026-22444&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"/></entry><entry><title>CVE-2025-66516: Apache Solr 
extraction module vulnerable to XXE attacks via XFA content in 
PDFs</title><link 
href="/cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs.html"
 
rel="alternate"/><published>2025-12-09T00:00:00+00:00</published><updated>2025-12-09T00:00:00+00:00</update
 [...]
 &lt;p&gt;High&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
 &lt;ul&gt;
@@ -2248,71 +2287,4 @@ features of many of the world's largest internet 
sites.&lt;/p&gt;
 &lt;p&gt;The release is available for immediate download at:&lt;/p&gt;
 &lt;p&gt;&lt;a 
href="https://www.apache.org/dyn/closer.lua/lucene/solr/6.6.4"&gt;https://www.apache.org/dyn/closer.lua/lucene/solr/6.6.4&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;Please read CHANGES.txt for a detailed list of changes:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://solr.apache.org/6_6_4/changes/Changes.html"&gt;https://solr.apache.org/6_6_4/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"/></entry><entry><title>Apache Solr™ 7.3.1 
available</title><link href="/" 
rel="alternate"/><published>2018-05-15T00:00:00+00:00</published><updated>2018-05-15T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2018-05-15:/</id><summary 
type="html">&lt;p&gt;The Lucene PMC is ple [...]
-&lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the
-Apache Lucene project. Its major features include powerful full-text search,
-hit highlighting, faceted search and analytics, rich document parsing,
-geospatial search, extensive …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Lucene PMC is pleased to announce the release of 
Apache Solr 7.3.1&lt;/p&gt;
-&lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the
-Apache Lucene project. Its major features include powerful full-text search,
-hit highlighting, faceted search and analytics, rich document parsing,
-geospatial search, extensive REST APIs as well as parallel SQL. Solr is
-enterprise grade, secure and highly scalable, providing fault tolerant
-distributed search and indexing, and powers the search and navigation
-features of many of the world's largest internet sites.&lt;/p&gt;
-&lt;p&gt;This release includes 9 bug fixes since the 7.3.0 release. Some of 
the major fixes are:&lt;/p&gt;
-&lt;ul&gt;
-&lt;li&gt;Upgrade commons-fileupload dependency to 1.3.3 to address 
CVE-2016-1000031&lt;/li&gt;
-&lt;li&gt;Deleting replicas sometimes fails and causes the replicas to exist 
in the down state&lt;/li&gt;
-&lt;li&gt;A successful restore collection should mark the shard state as 
active and not buffering&lt;/li&gt;
-&lt;li&gt;Do not allow to use absolute URIs for including other files in 
solrconfig.xml and schema parsing&lt;/li&gt;
-&lt;/ul&gt;
-&lt;p&gt;Furthermore, this release includes Apache Lucene 7.3.1 which includes 
1 bug
-fix since the 7.3.0 release.&lt;/p&gt;
-&lt;p&gt;The release is available for immediate download at:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://www.apache.org/dyn/closer.lua/lucene/solr/7.3.1"&gt;https://www.apache.org/dyn/closer.lua/lucene/solr/7.3.1&lt;/a&gt;&lt;/p&gt;
-&lt;p&gt;Please read CHANGES.txt for a detailed list of changes:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://solr.apache.org/7_3_1/changes/Changes.html"&gt;https://solr.apache.org/7_3_1/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"/></entry><entry><title>CVE-2018-1308: XXE attack through 
Apache Solr's DIH's dataConfig request parameter</title><link 
href="/cve-2018-1308-xxe-attack-through-apache-solrs-dihs-dataconfig-request-parameter.html"
 
rel="alternate"/><published>2018-04-08T00:00:00+00:00</published><updated>2018-04-08T00:00:00+00:
 [...]
-&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Major&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
-The Apache Software Foundation&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
-&lt;ul&gt;
-&lt;li&gt;Solr 1.2 to 6.6.2&lt;/li&gt;
-&lt;li&gt;Solr 7.0.0 to 7.2.1&lt;/li&gt;
-&lt;/ul&gt;
-&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
-The details of this vulnerability were reported to the Apache Security mailing 
list. &lt;/p&gt;
-&lt;p&gt;This vulnerability …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;CVE-2018-1308: XXE attack through Apache Solr's DIH's 
dataConfig request parameter&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Major&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
-The Apache Software Foundation&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
-&lt;ul&gt;
-&lt;li&gt;Solr 1.2 to 6.6.2&lt;/li&gt;
-&lt;li&gt;Solr 7.0.0 to 7.2.1&lt;/li&gt;
-&lt;/ul&gt;
-&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
-The details of this vulnerability were reported to the Apache Security mailing 
list. &lt;/p&gt;
-&lt;p&gt;This vulnerability relates to an XML external entity expansion (XXE) 
in the
-&lt;code&gt;&amp;amp;dataConfig=&amp;lt;inlinexml&amp;gt;&lt;/code&gt; 
parameter of Solr's DataImportHandler. It can be
-used as XXE using file/ftp/http protocols in order to read arbitrary local
-files from the Solr server or the internal network. See [1] for more 
details.&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
-Users are advised to upgrade to either Solr 6.6.3 or Solr 7.3.0 releases both
-of which address the vulnerability. Once upgrade is complete, no other steps
-are required. Those releases disable external entities in anonymous XML files
-passed through this request parameter. &lt;/p&gt;
-&lt;p&gt;If users are unable to upgrade to Solr 6.6.3 or Solr 7.3.0 then they 
are
-advised to disable data import handler in their solrconfig.xml file and
-restart their Solr instances. Alternatively, if Solr instances are only used
-locally without access to public internet, the vulnerability cannot be used
-directly, so it may not be required to update, and instead reverse proxies or
-Solr client applications should be guarded to not allow end users to inject
-&lt;code&gt;dataConfig&lt;/code&gt; request parameters. Please refer to [2] on 
how to correctly
-secure Solr servers.&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
-麦 香浓郁&lt;/p&gt;
-&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
-&lt;p&gt;[1] &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-11971"&gt;https://issues.apache.org/jira/browse/SOLR-11971&lt;/a&gt;&lt;br&gt;
-[2] &lt;a 
href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"/></entry></feed>
\ No newline at end of file
+&lt;p&gt;&lt;a 
href="https://solr.apache.org/6_6_4/changes/Changes.html"&gt;https://solr.apache.org/6_6_4/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"/></entry></feed>
\ No newline at end of file
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 817dcb232..c8d986f50 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -1,5 +1,44 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"/><link 
href="/feeds/solr/security.atom.xml" 
rel="self"/><id>/</id><updated>2025-12-09T00:00:00+00:00</updated><entry><title>CVE-2025-66516:
 Apache Solr extraction module vulnerable to XXE attacks via XFA content in 
PDFs</title><link 
href="/cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs.html"
 rel="alternate"/><published>2025-12- [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"/><link 
href="/feeds/solr/security.atom.xml" 
rel="self"/><id>/</id><updated>2026-01-20T00:00:00+00:00</updated><entry><title>CVE-2026-22022
 - Unauthorized bypass of certain "predefined permission" rules in the 
RuleBasedAuthorizationPlugin</title><link 
href="/cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin.html"
 rel [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule 
Based Authorization Plugin" are vulnerable to allowing unauthorized access to 
certain Solr APIs, due to insufficiently strict input validation in those 
components.  Only deployments that meet all of the following criteria 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule 
Based Authorization Plugin" are vulnerable to allowing unauthorized access to 
certain Solr APIs, due to insufficiently strict input validation in those 
components.  Only deployments that meet all of the following criteria are 
impacted by this vulnerability:&lt;/p&gt;
+&lt;ol&gt;
+&lt;li&gt;Use of Solr's "RuleBasedAuthorizationPlugin"&lt;/li&gt;
+&lt;li&gt;A RuleBasedAuthorizationPlugin config (see security.json) that 
specifies multiple "roles"&lt;/li&gt;
+&lt;li&gt;A RuleBasedAuthorizationPlugin permission list (see security.json) 
that uses one or more of the following pre-defined permission rules: 
"config-read", "config-edit", "schema-read", "metrics-read", or 
"security-read".&lt;/li&gt;
+&lt;li&gt;A RuleBasedAuthorizationPlugin permission list that doesn't define 
the "all" pre-defined permission&lt;/li&gt;
+&lt;li&gt;A networking setup that allows clients to make unfiltered network 
requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, 
unmodified or restricted by any intervening proxy or gateway)&lt;/li&gt;
+&lt;/ol&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users can mitigate this vulnerability by ensuring that their 
RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined 
permission and associates the permission with an "admin" or other privileged 
role.  Users can also upgrade to a Solr version outside of the impacted range, 
such as the recently released Solr 9.10.1.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+monkeontheroof (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-18054"&gt;SOLR-18054&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22022"&gt;CVE-2026-22022&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"/></entry><entry><title>CVE-2026-22444 - Insufficient 
file-access checking in standalone core-creation requests</title><link 
href="/cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests.html"
 
rel="alternate"/><published>2026-01-20T00:00:00+00:00</published><updated>2026-01-20T00:00:00+00:00</updated><author><name>S
 [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;The "create core" API of Apache Solr 8.6 through 9.10.0 lacks 
sufficient input validation on some API parameters, which can cause Solr to 
check the existence of and attempt to read file-system paths that should be 
disallowed by Solr's "allowPaths" security setting.  These read-only 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;The "create core" API of Apache Solr 8.6 through 9.10.0 lacks 
sufficient input validation on some API parameters, which can cause Solr to 
check the existence of and attempt to read file-system paths that should be 
disallowed by Solr's "allowPaths" security setting.  These read-only accesses 
can allow users to create cores using unexpected configsets if any are 
accessible via the filesystem.  On Windows systems configured to allow UNC 
paths this can additionally cause disclosure  [...]
+&lt;p&gt;Solr deployments are subject to this vulnerability if they meet the 
following criteria:&lt;/p&gt;
+&lt;ol&gt;
+&lt;li&gt;Solr is running in its "standalone" mode.&lt;/li&gt;
+&lt;li&gt;Solr's "allowPath" setting is being used to restrict file access to 
certain directories.&lt;/li&gt;
+&lt;li&gt;Solr's "create core" API is exposed and accessible to untrusted 
users.  This can happen if Solr's RuleBasedAuthorizationPlugin is disabled, or 
if it is enabled but the "core-admin-edit" predefined permission (or an 
equivalent custom permission) is given to low-trust (i.e. non-admin) user 
roles.&lt;/li&gt;
+&lt;/ol&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users can mitigate this by enabling Solr's 
RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list 
that prevents untrusted users from creating new Solr cores.  Users should also 
upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this 
issue.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+Damon Toey (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-18058"&gt;SOLR-18058&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22444"&gt;CVE-2026-22444&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"/></entry><entry><title>CVE-2025-66516: Apache Solr 
extraction module vulnerable to XXE attacks via XFA content in 
PDFs</title><link 
href="/cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs.html"
 
rel="alternate"/><published>2025-12-09T00:00:00+00:00</published><updated>2025-12-09T00:00:00+00:00</update
 [...]
 &lt;p&gt;High&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
 &lt;ul&gt;
diff --git a/output/index.html b/output/index.html
index d3d58d729..a84ca2920 100644
--- a/output/index.html
+++ b/output/index.html
@@ -130,7 +130,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2025-12-09">
+<section class="security" latest-date="2026-01-20">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="security.html">&#x26A0; There are recent security 
announcements. Read more on the Security page.</a></h2>
diff --git a/output/news.html b/output/news.html
index e3ef8eab9..95f58a62a 100644
--- a/output/news.html
+++ b/output/news.html
@@ -169,6 +169,47 @@
 <p><a 
href="https://solr.apache.org/guide/solr/9_10/upgrade-notes/solr-upgrade-notes.html";>https://solr.apache.org/guide/solr/9_10/upgrade-notes/solr-upgrade-notes.html</a></p>
 <p>Please read CHANGELOG.md for a full list of bugfixes:</p>
 <p><a 
href="https://solr.apache.org/9_10_1/changes/Changes.html";>https://solr.apache.org/9_10_1/changes/Changes.html</a></p>
+  <h2 
id="cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin">20
 January 2026, CVE-2026-22022 - Unauthorized bypass of certain "predefined 
permission" rules in the RuleBasedAuthorizationPlugin
+    <a class="headerlink" 
href="#cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Description</strong>
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule 
Based Authorization Plugin" are vulnerable to allowing unauthorized access to 
certain Solr APIs, due to insufficiently strict input validation in those 
components.  Only deployments that meet all of the following criteria are 
impacted by this vulnerability:</p>
+<ol>
+<li>Use of Solr's "RuleBasedAuthorizationPlugin"</li>
+<li>A RuleBasedAuthorizationPlugin config (see security.json) that specifies 
multiple "roles"</li>
+<li>A RuleBasedAuthorizationPlugin permission list (see security.json) that 
uses one or more of the following pre-defined permission rules: "config-read", 
"config-edit", "schema-read", "metrics-read", or "security-read".</li>
+<li>A RuleBasedAuthorizationPlugin permission list that doesn't define the 
"all" pre-defined permission</li>
+<li>A networking setup that allows clients to make unfiltered network requests 
to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified 
or restricted by any intervening proxy or gateway)</li>
+</ol>
+<p><strong>Mitigation</strong></p>
+<p>Users can mitigate this vulnerability by ensuring that their 
RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined 
permission and associates the permission with an "admin" or other privileged 
role.  Users can also upgrade to a Solr version outside of the impacted range, 
such as the recently released Solr 9.10.1.</p>
+<p><strong>Credit</strong>
+monkeontheroof (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-18054";>SOLR-18054</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22022";>CVE-2026-22022</a></p>
+  <h2 
id="cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests">20
 January 2026, CVE-2026-22444 - Insufficient file-access checking in standalone 
core-creation requests
+    <a class="headerlink" 
href="#cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Description</strong></p>
+<p>The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient 
input validation on some API parameters, which can cause Solr to check the 
existence of and attempt to read file-system paths that should be disallowed by 
Solr's "allowPaths" security setting.  These read-only accesses can allow users 
to create cores using unexpected configsets if any are accessible via the 
filesystem.  On Windows systems configured to allow UNC paths this can 
additionally cause disclosure of NTL [...]
+<p>Solr deployments are subject to this vulnerability if they meet the 
following criteria:</p>
+<ol>
+<li>Solr is running in its "standalone" mode.</li>
+<li>Solr's "allowPath" setting is being used to restrict file access to 
certain directories.</li>
+<li>Solr's "create core" API is exposed and accessible to untrusted users.  
This can happen if Solr's RuleBasedAuthorizationPlugin is disabled, or if it is 
enabled but the "core-admin-edit" predefined permission (or an equivalent 
custom permission) is given to low-trust (i.e. non-admin) user roles.</li>
+</ol>
+<p><strong>Mitigation</strong></p>
+<p>Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if 
disabled) and configuring a permission-list that prevents untrusted users from 
creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or 
greater, which contain fixes for this issue.</p>
+<p><strong>Credit</strong>
+Damon Toey (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-18058";>SOLR-18058</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22444";>CVE-2026-22444</a></p>
   <h2 
id="cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs">9
 December 2025, CVE-2025-66516: Apache Solr extraction module vulnerable to XXE 
attacks via XFA content in PDFs
     <a class="headerlink" 
href="#cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs"
 title="Permanent link">¶</a>
   </h2>
diff --git a/output/operator/index.html b/output/operator/index.html
index 4ef9cc8bb..037be7369 100644
--- a/output/operator/index.html
+++ b/output/operator/index.html
@@ -122,7 +122,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2025-12-09">
+<section class="security" latest-date="2026-01-20">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="/security.html">&#x26A0; There are recent security 
announcements. Read more on the Solr Security page.</a></h2>
diff --git a/output/security.html b/output/security.html
index 9cd863888..195590ac8 100644
--- a/output/security.html
+++ b/output/security.html
@@ -205,6 +205,16 @@ with you to see if we can provide this information in 
other variations or format
             <th width="95">Date</th>
             <th>Announcement</th>
         </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2026-22022";>CVE-2026-22022</a></td>
+            <td>2026-01-20</td>
+            <td><a 
href="#cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin">CVE-2026-22022
 - Unauthorized bypass of certain "predefined permission" rules in the 
RuleBasedAuthorizationPlugin</a></td>
+        </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2026-22444";>CVE-2026-22444</a></td>
+            <td>2026-01-20</td>
+            <td><a 
href="#cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests">CVE-2026-22444
 - Insufficient file-access checking in standalone core-creation 
requests</a></td>
+        </tr>
         <tr>
             <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2025-66516";>CVE-2025-66516</a></td>
             <td>2025-12-09</td>
@@ -270,18 +280,51 @@ with you to see if we can provide this information in 
other variations or format
             <td>2021-12-18</td>
             <td><a 
href="#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler">Apache
 Solr information disclosure vulnerability through DataImportHandler</a></td>
         </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228";>CVE-2021-44228</a></td>
-            <td>2021-12-10</td>
-            <td><a 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228">Apache Solr 
affected by Apache Log4J CVE-2021-44228</a></td>
-        </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-27905";>CVE-2021-27905</a></td>
-            <td>2021-04-12</td>
-            <td><a 
href="#cve-2021-27905-ssrf-vulnerability-with-the-replication-handler">SSRF 
vulnerability with the Replication handler</a></td>
-        </tr>
     </table>
 
+  <h2 
id="cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin">2026-01-20,
 CVE-2026-22022 - Unauthorized bypass of certain "predefined permission" rules 
in the RuleBasedAuthorizationPlugin
+    <a class="headerlink" 
href="#cve-2026-22022-unauthorized-bypass-of-certain-predefined-permission-rules-in-the-rulebasedauthorizationplugin"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Description</strong>
+Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule 
Based Authorization Plugin" are vulnerable to allowing unauthorized access to 
certain Solr APIs, due to insufficiently strict input validation in those 
components.  Only deployments that meet all of the following criteria are 
impacted by this vulnerability:</p>
+<ol>
+<li>Use of Solr's "RuleBasedAuthorizationPlugin"</li>
+<li>A RuleBasedAuthorizationPlugin config (see security.json) that specifies 
multiple "roles"</li>
+<li>A RuleBasedAuthorizationPlugin permission list (see security.json) that 
uses one or more of the following pre-defined permission rules: "config-read", 
"config-edit", "schema-read", "metrics-read", or "security-read".</li>
+<li>A RuleBasedAuthorizationPlugin permission list that doesn't define the 
"all" pre-defined permission</li>
+<li>A networking setup that allows clients to make unfiltered network requests 
to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified 
or restricted by any intervening proxy or gateway)</li>
+</ol>
+<p><strong>Mitigation</strong></p>
+<p>Users can mitigate this vulnerability by ensuring that their 
RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined 
permission and associates the permission with an "admin" or other privileged 
role.  Users can also upgrade to a Solr version outside of the impacted range, 
such as the recently released Solr 9.10.1.</p>
+<p><strong>Credit</strong>
+monkeontheroof (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-18054";>SOLR-18054</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22022";>CVE-2026-22022</a></p>
+  <hr/>
+  <h2 
id="cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests">2026-01-20,
 CVE-2026-22444 - Insufficient file-access checking in standalone core-creation 
requests
+    <a class="headerlink" 
href="#cve-2026-22444-insufficient-file-access-checking-in-standalone-core-creation-requests"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Description</strong></p>
+<p>The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient 
input validation on some API parameters, which can cause Solr to check the 
existence of and attempt to read file-system paths that should be disallowed by 
Solr's "allowPaths" security setting.  These read-only accesses can allow users 
to create cores using unexpected configsets if any are accessible via the 
filesystem.  On Windows systems configured to allow UNC paths this can 
additionally cause disclosure of NTL [...]
+<p>Solr deployments are subject to this vulnerability if they meet the 
following criteria:</p>
+<ol>
+<li>Solr is running in its "standalone" mode.</li>
+<li>Solr's "allowPath" setting is being used to restrict file access to 
certain directories.</li>
+<li>Solr's "create core" API is exposed and accessible to untrusted users.  
This can happen if Solr's RuleBasedAuthorizationPlugin is disabled, or if it is 
enabled but the "core-admin-edit" predefined permission (or an equivalent 
custom permission) is given to low-trust (i.e. non-admin) user roles.</li>
+</ol>
+<p><strong>Mitigation</strong></p>
+<p>Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if 
disabled) and configuring a permission-list that prevents untrusted users from 
creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or 
greater, which contain fixes for this issue.</p>
+<p><strong>Credit</strong>
+Damon Toey (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-18058";>SOLR-18058</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2026-22444";>CVE-2026-22444</a></p>
+  <hr/>
   <h2 
id="cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs">2025-12-09,
 CVE-2025-66516: Apache Solr extraction module vulnerable to XXE attacks via 
XFA content in PDFs
     <a class="headerlink" 
href="#cve-2025-66516-apache-solr-extraction-module-vulnerable-to-xxe-attacks-via-xfa-content-in-pdfs"
 title="Permanent link">¶</a>
   </h2>
@@ -621,59 +664,6 @@ Upgrade to Solr 8.11.1, and/or ensure only trusted clients 
can make requests to
 Apache Solr would like to thank LaiHan of Nsfocus security team for reporting 
the issue</p>
 <p><strong>References:</strong><br>
 Jira issue <a 
href="https://issues.apache.org/jira/browse/SOLR-15826";>SOLR-15826</a></p>
-  <hr/>
-  <h2 id="apache-solr-affected-by-apache-log4j-cve-2021-44228">2021-12-10, 
Apache Solr affected by Apache Log4J CVE-2021-44228
-    <a class="headerlink" 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228" title="Permanent 
link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong>
-Critical</p>
-<p><strong>Versions Affected:</strong>
-7.4.0 to 7.7.3, 8.0.0 to 8.11.0</p>
-<p><strong>Description:</strong>
-Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
-<p>Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 through 
7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see <a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126";>https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126</a>
 for discussion.</p>
-<p>Solr's Prometheus Exporter uses Log4J as well but it does not log user 
input or data, so we don't see a risk there.</p>
-<p>Solr is <em>not</em> vulnerable to the followup 
<strong>CVE-2021-45046</strong> and <strong>CVE-2021-45105</strong>.  A listing 
of these and other CVEs with some justifications are listed in Solr's wiki: <a 
href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools";>https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools</a></p>
-<p><strong>Mitigation:</strong>
-Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
-<ul>
-<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version (<code>&gt;= 2.16.0</code>) of the Log4J 
dependency.</li>
-<li>If you are using Solr's official docker image, it has already been 
mitigated in all versions listed as supported on Docker Hub: <a 
href="https://hub.docker.com/_/solr";>https://hub.docker.com/_/solr</a>.  You 
may need to re-pull the image.</li>
-<li>Manually update the version of Log4J on your runtime classpath and restart 
your Solr application.</li>
-<li>(Linux/MacOS) Edit your <code>solr.in.sh</code> file to include:
-  <code>SOLR_OPTS="$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
-<li>(Windows) Edit your <code>solr.in.cmd</code> file to include:
-  <code>set SOLR_OPTS=%SOLR_OPTS% -Dlog4j2.formatMsgNoLookups=true</code></li>
-<li>Follow any of the other mitgations listed at <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></li>
-</ul>
-<p>The Log4J security page refers to setting 
<code>log4j2.formatMsgNoLookups=true</code> as a "discredited" mitigation.  In 
reality, it depends.
-We've looked at the root cause and audited the code paths that lead to the 
vulnerability, and we feel confident in this mitigation being sufficient for 
Solr.
-See <a 
href="https://lists.apache.org/thread/kgh63sncrsm2bls884pg87mnt8vqztmz";>https://lists.apache.org/thread/kgh63sncrsm2bls884pg87mnt8vqztmz</a>
 for discussion.</p>
-<p><strong>References:</strong>
-<a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></p>
-  <hr/>
-  <h2 
id="cve-2021-27905-ssrf-vulnerability-with-the-replication-handler">2021-04-12, 
CVE-2021-27905: SSRF vulnerability with the Replication handler
-    <a class="headerlink" 
href="#cve-2021-27905-ssrf-vulnerability-with-the-replication-handler" 
title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong>
-High</p>
-<p><strong>Versions Affected:</strong>
-7.0.0 to 7.7.3
-8.0.0 to 8.8.1</p>
-<p><strong>Description:</strong>
-The ReplicationHandler (normally registered at "/replication" under a Solr 
core) has a "masterUrl" (also "leaderUrl" alias) parameter that is used to 
designate another ReplicationHandler on another Solr core to replicate index 
data into the local core.
-To prevent a SSRF vulnerability, Solr ought to check these parameters against 
a similar configuration it uses for the "shards" parameter.  Prior to this bug 
getting fixed, it did not.</p>
-<p><strong>Mitigation:</strong>
-Any of the following are enough to prevent this vulnerability:</p>
-<ul>
-<li>Upgrade to <code>Solr 8.8.2</code> or greater.</li>
-<li>If upgrading is not an option, consider applying the patch in <a 
href="https://issues.apache.org/jira/browse/SOLR-15217";>SOLR-15217</a></li>
-<li>Ensure that any access to the replication handler is purely internal to 
Solr.  Typically, it's only accessed externally for diagnostic/informational 
purposes.</li>
-</ul>
-<p><strong>Credit:</strong>
-Reported by Caolinhong(Skay) from QI-ANXIN Cert (QI-ANXIN Technology Group 
Inc.)</p>
-<p><strong>References:</strong>
-<a href="https://issues.apache.org/jira/browse/SOLR-15217";>SOLR-15217</a>: 
CVE-2021-27905: SSRF vulnerability with the Replication handler</p>
   <hr/>
   <h1 id="cve-reports-for-apache-solr-dependencies">CVE reports for Apache 
Solr dependencies</h1>
   <p>Below is a list of CVE vulnerabilities in Apache Solr dependencies, and 
the state of their applicability to Solr.</p>


Reply via email to