Privilege Escalation Vulnerability in Splunk Enterprise and Cloud Platform
CVE-2025-20232

5.7MEDIUM

Key Information:

Vendor
Splunk
Vendor
CVE Published:
26 March 2025

Summary

In certain versions of Splunk Enterprise and Splunk Cloud Platform, a low-privileged user can exploit a vulnerability to execute saved searches with risky commands, utilizing the permissions of higher-privileged roles. This issue arises in scenarios where an attacker successfully deceives an authenticated user into executing a malicious request through their browser. The vulnerability highlights potential bypassing of secure command mechanisms at the '/app/search/search' endpoint, posing security risks to Splunk environments.

Affected Version(s)

Splunk Cloud Platform 9.3.2408 < 9.3.2408.103

Splunk Cloud Platform 9.2.2406 < 9.2.2406.108

Splunk Cloud Platform 9.2.2403 < 9.2.2403.113

References

CVSS V3.1

Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anton (therceman)
.