Access Control Flaw in Splunk Enterprise and Secure Gateway App
CVE-2025-20230

4.3MEDIUM

Key Information:

Vendor
Splunk
Vendor
CVE Published:
26 March 2025

Summary

In specific versions of Splunk Enterprise and the Splunk Secure Gateway app, a vulnerability exists that allows low-privileged users to edit and delete data belonging to other users. The flaw arises from inadequate access control and improper data ownership management within KVStore collections, which results in data being owned by the generic 'nobody' user. This oversight places sensitive user data at risk by allowing unauthorized access and manipulation, undermining the integrity of the application.

Affected Version(s)

Splunk Enterprise 9.4 < 9.4.1

Splunk Enterprise 9.3 < 9.3.3

Splunk Enterprise 9.2 < 9.2.5

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gabriel Nitu, Splunk<br><br>David Chen, Splunk
.