
The Apache Solr project, known for its highly reliable and scalable search platform, has released a security update addressing two significant vulnerabilities. These vulnerabilities, identified as CVE-2024-52012 and CVE-2025-24814, affect versions 6.6 through 9.7 of Apache Solr.
CVE-2024-52012: A Windows-Specific Threat
This vulnerability, classified as a relative path traversal flaw, specifically impacts Solr instances running on Windows environments. Due to insufficient input sanitization in the “configset upload” API, malicious actors could exploit this vulnerability to gain arbitrary filepath write-access. As the advisory states, “Maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.” The potential consequences include unauthorized data modification or system compromise.
CVE-2025-24814: Privilege Escalation via Core Creation
The second vulnerability, CVE-2025-24814, allows users to potentially replace “trusted” configset files with arbitrary configurations. This vulnerability affects Solr instances using the “FileSystemConfigSetService” component and running without proper authentication and authorization. Attackers could exploit this flaw to escalate privileges and execute malicious code. The advisory warns, “These replacement config files are treated as ‘trusted’ and can use <lib>
tags to add to Solr’s classpath, which an attacker might use to load malicious code as a searchComponent or other plugin.”
Mitigation and Remediation
The Apache Solr project has released version 9.8.0 to address both vulnerabilities. Users are strongly urged to upgrade to this latest version to mitigate the identified threats. As an alternative mitigation strategy, the advisory suggests using Solr’s “Rule-Based Authentication Plugin” to restrict access to the configset upload API or enabling authentication and authorization on Solr clusters.