Remote Code Execution Vulnerability in Splunk Enterprise and Splunk Cloud Platform
CVE-2025-20229

8HIGH

Key Information:

Vendor
Splunk
Vendor
CVE Published:
26 March 2025

What is CVE-2025-20229?

CVE-2025-20229 is a remote code execution vulnerability identified in specific versions of Splunk Enterprise and Splunk Cloud Platform. Splunk, a leading software platform for operational intelligence, allows organizations to analyze and visualize machine-generated data. This vulnerability affects low-privileged users who can exploit flawed authorization mechanisms to upload files to a designated directory. Such unauthorized uploads could allow malicious actors to execute arbitrary code on the server, posing severe risks to data integrity and system reliability.

Technical Details

The vulnerability exists in Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, along with certain versions of the Splunk Cloud Platform. It results from inadequate authorization checks that permit low-privileged users to manipulate files within the "$SPLUNK_HOME/var/run/splunk/apptemp" directory. This oversight can be exploited to perform remote code execution, enabling an attacker to run harmful scripts or commands on the server.

Potential Impact of CVE-2025-20229

  1. Unauthorized System Access: The vulnerability allows low-privileged users to execute arbitrary code, leading to unauthorized control over the Splunk instance. This compromised access can be exploited to execute additional malicious activities, including data exfiltration or system damage.

  2. Data Integrity Risks: By enabling code execution, malicious users can alter or corrupt the data stored and processed by Splunk, undermining the reliability of business insights derived from this data. This could potentially disrupt operations and decision-making processes.

  3. Escalation of Threats: Once access is gained through this vulnerability, attackers can leverage it as a foothold to deploy further exploits, potentially impacting other connected systems or networks. This escalation could lead to widespread impacts, including the installation of persistent malware or ransomware.

Affected Version(s)

Splunk Cloud Platform 9.3.2408 < 9.3.2408.104

Splunk Cloud Platform 9.2.2406 < 9.2.2406.108

Splunk Cloud Platform 9.2.2403 < 9.2.2403.114

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Alex Hordijk (hordalex)
.