This page documents the procedure for reporting a security vulnerability in Apache Solr and explains what happens after a report is submitted. It also provides canned email templates for PMC members to use when responding to reports.
Apache Solr is maintained by volunteers. The PMC will make every effort to respond promptly, but cannot guarantee specific response times. We appreciate your patience and your contribution to the security of the project.
If you have concerns about how the project team is handling a report, you may also contact security@apache.org directly.
Apache Solr follows the Apache Software Foundation's security process, which covers reporting, responsibility, private discussion, and CVE disclosure in detail. The rest of this page details this plan for the Solr project. If you have questions to these procedures, feel free to use our public mailing lists.
Ensure you have tested against a supported Solr version with both authentication and authorization properly configured. Solr's admin level APIs are designed to be used only by authenticated and trusted administrators.
A valid security report to security@solr.apache.org must:
flowchart TD
A["`**Submit security report**
*Plaintext · one issue*
*repro steps · auth enabled*
security@solr.apache.org`"]
D["`**PMC triage**
*up to 7 days*`"]
E["`**Rejected**
*No repro / no auth*
*zip or link / multiple issues*`"]
F["`**Needs changes**
*PMC requests clarification*`"]
G["`**Accepted**
*ACK email + private JIRA*
*within 7 days*`"]
I["`**Full investigation**
*up to 90 days*`"]
J["`**Won't fix**
*Reporter notified*`"]
K["`**Fix & coordinated disclosure**
*CVE published*
*reporter credited in advisory*`"]
A --> D
D -->|rejected| E
D -->|needs changes| F
D -->|accepted| G
F -->|revise & re-send| A
G --> I
I -->|not confirmed| J
I -->|confirmed| K
classDef submit fill:#eae6f5,stroke:#9b93d0,color:#3d3a6b
classDef process fill:#fdf4e8,stroke:#c8a86b,color:#5a4520
classDef rejected fill:#fde8e8,stroke:#d08080,color:#7a2020
classDef changes fill:#fdefd8,stroke:#d4a060,color:#7a4010
classDef accepted fill:#dff5ec,stroke:#6dbfa0,color:#1a5a40
classDef wontfix fill:#fde8e8,stroke:#d08080,color:#7a2020
classDef disclosure fill:#f5f0e0,stroke:#b8ad80,color:#4a4020
class A submit
class D,G,I process
class E rejected
class F changes
class J wontfix
class K disclosure
| Step | Who | Timeframe |
|---|---|---|
| Initial triage / acknowledgment | PMC volunteers | Up to 7 days |
| Full investigation | PMC volunteers | Up to 90 days |
| CVE ID allocation | PMC + ASF Security Team (CNA) | During fix development |
| Fix + CVE publication | PMC + ASF Security Team | Coordinated with you, the reporter |
| Credit in advisory | PMC | At public disclosure |
Public disclosure follows the ASF standard process and is announced on the oss-security mailing list.
The following section documents the internal triage process and provides email templates for responding to incoming reports.
The following templates are provided for PMC members responding to incoming reports. Click each entry to expand and view the template.
Thank you for your security report. We have received your report and created a private issue to track it. The Solr PMC will review your report and aim to update you within 30 days. We will keep you informed through this email thread. Please do not discuss this report on public channels (mailing lists, GitHub, social media) until we have coordinated public disclosure with you. If you have additional information, please reply to this email. Apache Solr Security Team security@solr.apache.org https://solr.apache.org/security.html
Thank you for contacting the Solr security team. We are unable to process reports that consist solely of scanner tool output without a demonstrated reproduction of the vulnerability in Apache Solr. Scanner reports list dependency CVEs that are often not applicable to how Solr uses those libraries. Before filing a security report, please: 1. Check https://solr.apache.org/security-dependency-cves.html — we publish a VEX file listing CVEs already assessed as not exploitable in Solr. 2. Verify the issue is actually exploitable in a properly configured Solr instance (with authentication and authorization enabled). 3. Write step-by-step reproduction steps that demonstrate the impact on Solr specifically. For dependency upgrade discussions, the public Solr users list is the right venue: users@solr.apache.org Please read https://solr.apache.org/security-reporting.html for the full process. Apache Solr Security Team
Thank you for your security report. Your email appears to describe several separate potential vulnerabilities. To allow each issue to be tracked, fixed, and disclosed independently, please re-submit each as a separate email to security@solr.apache.org. Each email should cover exactly one vulnerability with: - A clear description of the issue - Step-by-step reproduction instructions - The Solr version tested - The impact and attack scenario We will begin reviewing each issue once we receive the separate reports. Please read https://solr.apache.org/security-reporting.html for the full process. Apache Solr Security Team
Thank you for your security report. For security reasons, the Solr PMC does not open zip file attachments or follow external links (Google Docs, Dropbox, etc.) in security reports. Please re-send your report as plaintext in the body of an email to security@solr.apache.org, including: - Description of the vulnerability - Step-by-step reproduction instructions - Solr version and configuration tested - Expected vs. actual behavior - Any relevant log output, pasted directly into the email We look forward to reviewing your report once re-submitted in plaintext. Please read https://solr.apache.org/security-reporting.html for the full process. Apache Solr Security Team
Thank you for your security report.
After reviewing your report, we are unable to treat this as a security
vulnerability due to either of the following reasons:
a) The behavior requires Solr to be running without authentication.
Solr is not designed for unauthenticated operation in any networked
environment. Running without authentication is a misconfiguration,
not a Solr vulnerability.
b) The action performed was permitted by the role used in your test.
A vulnerability requires either that the action exceeded what the
role should allow, or that it should never be permitted for any role.
If you believe our assessment is incorrect, please reply with details
explaining why the behavior should not be possible under your tested
configuration and role.
Please read https://solr.apache.org/security-reporting.html for the full process.
Apache Solr Security Team
Once a report passes initial triage, the PMC follows these steps: