Server-Side Request Forgery in Splunk Enterprise and Cloud Platform
CVE-2025-20371

7.5HIGH

Key Information:

Vendor

Splunk

Vendor
CVE Published:
1 October 2025

What is CVE-2025-20371?

In specific versions of Splunk Enterprise and Splunk Cloud Platform, an unauthenticated attacker can exploit a blind server-side request forgery (SSRF) vulnerability. This allows the attacker to make REST API calls with the authority of a high-privileged user, potentially exposing sensitive data and increasing security risks. It is crucial for users of affected Splunk products to apply appropriate security measures and updates to mitigate this risk.

Affected Version(s)

Splunk Cloud Platform 9.3.2411 < 9.3.2411.109

Splunk Cloud Platform 9.3.2408 < 9.3.2408.119

Splunk Cloud Platform 9.2.2406 < 9.2.2406.122

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Alex Hordijk (hordalex)
.
CVE-2025-20371 : Server-Side Request Forgery in Splunk Enterprise and Cloud Platform