Cyber Posture

CVE-2026-22022

High

Published: 21 January 2026

Published
21 January 2026
Modified
27 January 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0019 40.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components. Only deployments that meet all of…

more

the following criteria are impacted by this vulnerability: * Use of Solr's "RuleBasedAuthorizationPlugin" * A RuleBasedAuthorizationPlugin config (see security.json) that specifies multiple "roles" * A RuleBasedAuthorizationPlugin permission list (see security.json) that uses one or more of the following pre-defined permission rules: "config-read", "config-edit", "schema-read", "metrics-read", or "security-read". * A RuleBasedAuthorizationPlugin permission list that doesn't define the "all" pre-defined permission * A networking setup that allows clients to make unfiltered network requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified or restricted by any intervening proxy or gateway) Users can mitigate this vulnerability by ensuring that their RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined permission and associates the permission with an "admin" or other privileged role. Users can also upgrade to a Solr version outside of the impacted range, such as the recently released Solr 9.10.1.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the authorization flaw in Solr's RuleBasedAuthorizationPlugin by applying vendor-recommended patches or upgrading to Solr 9.10.1 or later directly eliminates unauthorized API access.

prevent

Establishing and enforcing configuration settings in security.json to include the 'all' pre-defined permission for admin roles prevents the specific misconfiguration enabling unauthorized access to Solr APIs.

prevent

Enforcing approved authorizations through properly validated mechanisms like the RuleBasedAuthorizationPlugin directly counters the improper authorization allowing access to config-read, config-edit, and similar APIs.

Security SummaryAI

CVE-2026-22022 is a vulnerability in Apache Solr versions 5.3.0 through 9.10.0 that affects deployments relying on the Rule Based Authorization Plugin due to insufficiently strict input validation. This flaw enables unauthorized access to certain Solr APIs, but only impacts configurations meeting all of the following criteria: use of the RuleBasedAuthorizationPlugin; a security.json configuration specifying multiple roles; permission lists that include one or more of the pre-defined rules "config-read", "config-edit", "schema-read", "metrics-read", or "security-read" without defining the "all" pre-defined permission; and a networking setup allowing unfiltered client requests to Solr.

Attackers can exploit this vulnerability remotely over the network with no authentication required (AV:N/AC:L/PR:N), provided the networking allows direct HTTP/HTTPS access to Solr without proxy or gateway restrictions. Successful exploitation grants unauthorized access to sensitive APIs, resulting in high confidentiality impact (such as reading configurations or metrics) and low integrity impact, as reflected in the CVSS v3.1 base score of 8.2 (C:H/I:L/A:N). The issue stems from CWE-285 (Improper Authorization).

Apache advisories recommend mitigating by updating the RuleBasedAuthorizationPlugin configuration in security.json to specify the "all" pre-defined permission and associate it with an "admin" or other privileged role. Alternatively, users should upgrade to Solr 9.10.1 or later versions outside the affected range. Details are available in the Apache announcement at https://lists.apache.org/thread/d59hqbgo7p62myq7mgfpz7or8n1j7wbn and the OSS-Security mailing list at http://www.openwall.com/lists/oss-security/2026/01/20/4.

Details

CWE(s)

Affected Products

apache
solr
5.3.0 — 9.10.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote, unauthenticated exploitation of a public-facing Apache Solr application to access sensitive APIs (e.g., config-read, security-read), directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References