Plain Text Exposure of Secrets in Splunk Add-on for Palo Alto Networks
CVE-2025-20373

2.7LOW

Key Information:

Vendor

Splunk

Vendor
CVE Published:
26 November 2025

What is CVE-2025-20373?

The Splunk Add-on for Palo Alto Networks prior to version 2.0.2 has a significant vulnerability where client secrets are exposed in plain text within the _internal index during the addition of new Data Security Accounts. This exposure necessitates either direct access to log files or administrative access to internal indexes—permissions typically reserved for users in the admin role. For enhanced security, it is crucial to review and restrict access to the internal index, ensuring that only administrator-level roles have the ability to view sensitive data. For more information, please refer to the Splunk guidance on managing roles and capabilities.

Affected Version(s)

Splunk Add-on for Palo Alto Networks 2.0 < 2.0.2

References

CVSS V3.1

Score:
2.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Vignesh Subramanian, Splunk
.