Input Validation Flaw in Apache Solr Affects Core Creation Process
CVE-2026-22444
Key Information:
- Vendor
Apache
- Status
- Vendor
- CVE Published:
- 21 January 2026
Badges
What is CVE-2026-22444?
The 'create core' API in Apache Solr, from versions 8.6 to 9.10.0, is affected by insufficient input validation on certain API parameters. This flaw permits unauthorized filesystem access, potentially allowing users to create cores using unexpected configuration sets if accessible. Particularly on Windows systems with UNC path support, this could also expose sensitive NTLM 'user' hashes. To secure installations, it is essential to ensure that Solr operates in standalone mode with proper restrictions, leveraging the 'allowPaths' setting and enabling the RuleBasedAuthorizationPlugin to manage permissions effectively. Users are advised to upgrade to Apache Solr version 9.10.1 or later to mitigate these risks.
Affected Version(s)
Apache Solr 8.6 <= 9.10.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved