CVE-2025-24814

CWE-2508 documents7 sources
Severity
5.5MEDIUM
EPSS
0.8%
top 26.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27
Latest updateJul 15

Description

Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem. These replacement config

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:LExploitability: 2.1 | Impact: 3.4

Affected Packages4 packages

NVDapache/solr< 9.8.0
Debianlucene-solr< 3.6.2+dfsg-23+3

🔴Vulnerability Details

4
OSV
CVE-2025-24814: Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetServi2025-01-27
GHSA
Apache Solr vulnerable to Execution with Unnecessary Privileges2025-01-27
CVEList
Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files2025-01-27
OSV
Apache Solr vulnerable to Execution with Unnecessary Privileges2025-01-27

📋Vendor Advisories

3
Oracle
Oracle Oracle Communications Applications Risk Matrix: Core (Apache Solr) — CVE-2025-248142025-07-15
Red Hat
solr: org.apache.solr: Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files2025-01-27
Debian
CVE-2025-24814: lucene-solr - Core creation allows users to replace "trusted" configset files with arbitrary c...2025
CVE-2025-24814 (MEDIUM CVSS 5.5) | Core creation allows users to repla | cvebase.io