[SOLR-17822] Document non-exploitability of CVE-2025-48924 #152
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This update documents that CVE-2025-48924 is not exploitable in Apache Solr, based on detailed dependency analysis and code path evaluation.
Summary
Although Solr includes the vulnerable Commons Lang library and transitive dependencies such as Commons Text and Commons Configuration, the conditions required for exploitation are not met in any Solr execution paths.
Detailed Analysis
The vulnerable Commons Lang functionality is only exercised via Commons Text.
According to the Apache Commons Text VEX document, exploitation is limited to the use of
StringSubstitutorandStringLookup.These classes are not used directly in Solr’s codebase.
Commons Text is only included in two Solr modules:
solr-sqlsolr-hadoop-authNeither module makes any indirect use of the vulnerable classes, with one exception.
The only dependency that uses these classes is Commons Configuration, which is pulled in transitively via Hadoop.
MetricsConfigclass in thehadoop-commonlibrary.hadoop-metrics2.propertiesfile, which is considered a trusted configuration file, typically provided by the system administrator.As a result, the vulnerable expression interpolation logic is never invoked with untrusted input, and Solr does not meet the conditions for exploitability outlined in the Apache Commons Configuration VEX document.
References