The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22022

CVE-2026-22022: Apache Solr Auth Bypass Vulnerability

CVE-2026-22022 is an authentication bypass flaw in Apache Solr versions 5.3.0 through 9.10.0 affecting Rule Based Authorization Plugin deployments. This article covers technical details, affected configurations, and mitigation.

Published: January 23, 2026

CVE-2026-22022 Overview

CVE-2026-22022 is an authorization bypass vulnerability affecting Apache Solr deployments that use the Rule Based Authorization Plugin. The vulnerability stems from insufficiently strict input validation, allowing unauthorized access to certain Solr APIs. This affects Apache Solr versions 5.3.0 through 9.10.0 when specific configuration conditions are met.

Critical Impact

Attackers can bypass authorization controls to access protected Solr APIs, potentially exposing sensitive configuration data, schema information, and security settings without proper authentication.

Affected Products

  • Apache Solr versions 5.3.0 through 9.10.0
  • Deployments using RuleBasedAuthorizationPlugin with multiple roles configured
  • Configurations using pre-defined permissions without the "all" permission defined

Discovery Timeline

  • January 21, 2026 - CVE CVE-2026-22022 published to NVD
  • January 21, 2026 - Last updated in NVD database

Technical Details for CVE-2026-22022

Vulnerability Analysis

This authorization bypass vulnerability (CWE-285: Improper Authorization) allows attackers to circumvent access controls in Apache Solr's Rule Based Authorization Plugin. The vulnerability is exploitable via network access without requiring authentication or user interaction.

The flaw specifically impacts deployments that meet all of the following criteria:

  1. Use of Solr's RuleBasedAuthorizationPlugin
  2. A configuration in security.json that specifies multiple roles
  3. Permission lists using pre-defined permission rules such as config-read, config-edit, schema-read, metrics-read, or security-read
  4. Permission lists that do not define the all pre-defined permission
  5. A networking setup that allows unfiltered client requests to reach Solr directly

When these conditions are met, attackers can craft requests that bypass the intended authorization checks, gaining access to protected API endpoints.

Root Cause

The vulnerability originates from insufficiently strict input validation within the RuleBasedAuthorizationPlugin components. The authorization plugin fails to properly validate and restrict access when certain pre-defined permissions are configured without a catch-all permission rule. This allows request patterns that should be denied to slip through the authorization checks.

Attack Vector

The attack is network-based and requires no authentication or user interaction. Attackers can exploit this vulnerability by sending specially crafted HTTP/HTTPS requests directly to vulnerable Solr instances. The attack targets the authorization decision logic in the RuleBasedAuthorizationPlugin, exploiting gaps in how permissions are evaluated when the all permission is not defined.

The vulnerability allows unauthorized access to sensitive API endpoints including:

  • Configuration read/write operations (config-read, config-edit)
  • Schema information (schema-read)
  • Metrics data (metrics-read)
  • Security configuration (security-read)

Detection Methods for CVE-2026-22022

Indicators of Compromise

  • Unexpected API requests to Solr endpoints from unauthorized sources
  • Access logs showing requests to /solr/admin/config, /solr/admin/schema, /solr/admin/metrics, or /solr/admin/security from unusual IP addresses
  • Unauthorized configuration changes in Solr clusters
  • Anomalous query patterns targeting administrative endpoints

Detection Strategies

  • Monitor Solr access logs for requests to administrative API endpoints from non-administrative sources
  • Implement network-level monitoring for traffic patterns targeting Solr instances on ports 8983 (HTTP) or 8984 (HTTPS)
  • Review security.json configurations to identify vulnerable permission setups lacking the all permission
  • Deploy intrusion detection rules to flag suspicious request patterns to Solr admin APIs

Monitoring Recommendations

  • Enable comprehensive access logging for all Solr API endpoints
  • Configure alerting for failed and successful authorization attempts to sensitive endpoints
  • Implement network segmentation monitoring to detect direct client access to Solr instances
  • Regularly audit RuleBasedAuthorizationPlugin configurations across all Solr deployments

How to Mitigate CVE-2026-22022

Immediate Actions Required

  • Review all Solr deployments using RuleBasedAuthorizationPlugin for vulnerable configurations
  • Add the all pre-defined permission to security.json and associate it with an admin or privileged role
  • Implement network-level filtering to prevent unfiltered client requests from reaching Solr directly
  • Upgrade to Apache Solr 9.10.1 or later, which addresses this vulnerability

Patch Information

Apache has released Solr version 9.10.1 which resolves this vulnerability. Organizations should upgrade to this version or later to fully remediate the issue. For detailed information, refer to the Apache Security Mailing List Thread and the Openwall OSS-Security Discussion.

Workarounds

  • Configure the all pre-defined permission in your RuleBasedAuthorizationPlugin and assign it to an admin role
  • Deploy a reverse proxy or API gateway in front of Solr to filter and validate incoming requests
  • Implement network segmentation to ensure Solr instances are not directly accessible from untrusted networks
  • Restrict access to Solr administrative endpoints using firewall rules
bash
# Example security.json configuration to mitigate the vulnerability
# Add the "all" permission and associate it with the admin role
# Update your security.json to include:
# "permissions": [
#   {"name": "all", "role": "admin"},
#   ... other permissions ...
# ]
# Restart Solr after modifying security.json for changes to take effect

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechApache Solr

  • SeverityHIGH

  • CVSS Score8.2

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-285
  • Technical References
  • Apache Security Mailing List Thread

  • Openwall OSS-Security Discussion
  • Related CVEs
  • CVE-2024-45216: Apache Solr Auth Bypass Vulnerability

  • CVE-2020-13957: Apache Solr Auth Bypass Vulnerability

  • CVE-2026-22444: Apache Solr Information Disclosure Flaw

  • CVE-2024-52012: Apache Solr Path Traversal Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English