Back to list

Goobi viewer - Core: Unauthenticated Solr Streaming Expression Proxy — CVE-2026-45083

GitHub · GitHub · CVE-2026-45083

ID
CVE-2026-45083
Date
Activity
Source
GitHub
Vendor
GitHub
Threat
critical
CVSS
9.8

Summary

### Summary The Goobi viewer REST endpoint `POST /api/v1/index/stream` accepted an arbitrary Solr streaming expression from unauthenticated network clients and forwarded it to the backend Solr server without restriction. An attacker could read the complete Solr index and, in default Solr deployments, also modify or delete indexed records. The API endpoint has now been removed. ### Impact - **Complete Solr index…

Product

maven: io.goobi.viewer:viewer-core

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories