Listen to this Post
How the CVE Works
CVE-2025-24814 exploits a misconfiguration in Apache Solr’s FileSystemConfigSetService
, the default component in standalone or user-managed mode. Unauthenticated attackers can replace “trusted” configset files with malicious ones, leveraging `
DailyCVE Form
Platform: Apache Solr
Version: ≤ 9.7
Vulnerability: ConfigSet hijacking
Severity: Critical
Date: 06/25/2025
Prediction: Patch expected 07/15/2025
What Undercode Say
Analytics:
solrctl --check-configset grep -r "<lib>" /var/solr/configsets curl -X POST "http://<solr-host>:8983/solr/admin/cores?action=CREATE&name=exploit&configSet=malicious"
Exploit:
1. Upload malicious configset via filesystem access.
2. Trigger core creation referencing the rogue configset.
3. `` loads attacker-controlled JARs.
Protection from this CVE
- Enable Solr authentication/authorization.
- Migrate to SolrCloud mode.
- Upgrade to Solr 9.8.0+.
Impact:
Remote code execution, full system compromise.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode