Unauthorized JavaScript Execution in Splunk Enterprise and Splunk Cloud Platform
CVE-2025-20367

5.7MEDIUM

Key Information:

Vendor

Splunk

Vendor
CVE Published:
1 October 2025

What is CVE-2025-20367?

In specific versions of Splunk Enterprise and Splunk Cloud Platform, a vulnerability allows low-privileged users to exploit the dataset.command parameter of the /app/search/table endpoint. By crafting a malicious payload, the users could execute unauthorized JavaScript code in the browsers of other users, potentially compromising user data and security. This highlights the importance of stringent input validation to protect against such exploits.

Affected Version(s)

Splunk Cloud Platform 9.3.2411 < 9.3.2411.109

Splunk Cloud Platform 9.3.2408 < 9.3.2408.119

Splunk Cloud Platform 9.2.2406 < 9.2.2406.122

References

CVSS V3.1

Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Danylo Dmytriiev (DDV_UA)
Anudeep Gandla, Splunk
.