Unauthorized JavaScript Execution in Splunk Enterprise and Splunk Cloud Platform
CVE-2025-20367
5.7MEDIUM
Key Information:
- Vendor
Splunk
- Vendor
- CVE Published:
- 1 October 2025
What is CVE-2025-20367?
In specific versions of Splunk Enterprise and Splunk Cloud Platform, a vulnerability allows low-privileged users to exploit the dataset.command
parameter of the /app/search/table
endpoint. By crafting a malicious payload, the users could execute unauthorized JavaScript code in the browsers of other users, potentially compromising user data and security. This highlights the importance of stringent input validation to protect against such exploits.
Affected Version(s)
Splunk Cloud Platform 9.3.2411 < 9.3.2411.109
Splunk Cloud Platform 9.3.2408 < 9.3.2408.119
Splunk Cloud Platform 9.2.2406 < 9.2.2406.122
References
CVSS V3.1
Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Danylo Dmytriiev (DDV_UA)
Anudeep Gandla, Splunk