Privilege Escalation Vulnerability in Splunk Enterprise and Cloud Platform
CVE-2025-20232
5.7MEDIUM
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 26 March 2025
Summary
In certain versions of Splunk Enterprise and Splunk Cloud Platform, a low-privileged user can exploit a vulnerability to execute saved searches with risky commands, utilizing the permissions of higher-privileged roles. This issue arises in scenarios where an attacker successfully deceives an authenticated user into executing a malicious request through their browser. The vulnerability highlights potential bypassing of secure command mechanisms at the '/app/search/search' endpoint, posing security risks to Splunk environments.
Affected Version(s)
Splunk Cloud Platform 9.3.2408 < 9.3.2408.103
Splunk Cloud Platform 9.2.2406 < 9.2.2406.108
Splunk Cloud Platform 9.2.2403 < 9.2.2403.113
References
CVSS V3.1
Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Anton (therceman)