Goobi viewer - Core: Unauthenticated Solr Streaming Expression Proxy — CVE-2026-45083
GitHub · GitHub · CVE-2026-45083
ID
CVE-2026-45083
CVE-2026-45083
Date
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
critical
critical
CVSS
9.8
9.8
Summary
### Summary The Goobi viewer REST endpoint `POST /api/v1/index/stream` accepted an arbitrary Solr streaming expression from unauthenticated network clients and forwarded it to the backend Solr server without restriction. An attacker could read the complete Solr index and, in default Solr deployments, also modify or delete indexed records. The API endpoint has now been removed. ### Impact - **Complete Solr index…
Product
maven: io.goobi.viewer:viewer-core
What to do
General, cautious steps (verify details in the official source):
- Prioritize patching or mitigation immediately (treat as actively risky).
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.