-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.solr:solr-core | maven | <= 5.3.0 | 5.3.1 |
The vulnerability stems from unescaped user input (the 'entry' parameter) being directly interpolated into a jQuery selector within an anonymous function in plugins.js. The patch introduces the .esc() method to sanitize the input, confirming the lack of escaping in the original code. This code executes when the Admin UI's plugins/cache page loads, making the anonymous function responsible for processing URL parameters the primary vulnerable component. Runtime detection would observe this function during exploitation as it constructs DOM elements with untrusted input.