Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default.
History

Wed, 25 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache solr
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache solr

Wed, 25 Jun 2025 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache solr

Tue, 24 Jun 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache solr
CPEs cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache solr

Sat, 15 Feb 2025 01:30:00 +0000

Type Values Removed Values Added
References

Thu, 06 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Tue, 28 Jan 2025 14:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}

threat_severity

Low


Mon, 27 Jan 2025 09:45:00 +0000

Type Values Removed Values Added
References

Mon, 27 Jan 2025 09:15:00 +0000

Type Values Removed Values Added
Description Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default.
Title Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files
Weaknesses CWE-250
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-15T00:10:36.558Z

Reserved: 2025-01-24T12:48:40.114Z

Link: CVE-2025-24814

cve-icon Vulnrichment

Updated: 2025-02-15T00:10:36.558Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-27T09:15:14.947

Modified: 2025-06-25T16:41:43.923

Link: CVE-2025-24814

cve-icon Redhat

Severity : Low

Publid Date: 2025-01-27T08:58:08Z

Links: CVE-2025-24814 - Bugzilla