Access Control Vulnerability in Splunk Archiver Application from Splunk
CVE-2025-20323

4.3MEDIUM

Key Information:

Vendor

Splunk

Vendor
CVE Published:
7 July 2025

What is CVE-2025-20323?

In specific versions of Splunk Enterprise, low-privileged users without 'admin' or 'power' roles can disable the scheduled search 'Bucket Copy Trigger' due to inadequate access controls in the Splunk Archiver application's saved searches. This vulnerability may lead to unintended data management issues, posing risks to data integrity and operational efficiency. Organizations using the affected versions should implement recommended security measures to safeguard their systems.

Affected Version(s)

Splunk Enterprise 9.4 < 9.4.3

Splunk Enterprise 9.3 < 9.3.5

Splunk Enterprise 9.2 < 9.2.7

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anton (therceman)
.
CVE-2025-20323 : Access Control Vulnerability in Splunk Archiver Application from Splunk