Splunk Enterprise and Cloud Platform Vulnerability Affecting Low-Privileged Users
CVE-2025-20379

3.5LOW

Key Information:

Vendor

Splunk

Vendor
CVE Published:
12 November 2025

What is CVE-2025-20379?

In specific versions of Splunk Enterprise and Splunk Cloud Platform, a vulnerability enables low-privileged users to execute saved searches with potentially harmful commands by leveraging the permissions of higher-privileged users. This occurs through the 'q' parameter on the '/services/streams/search' endpoint, where an attacker can exploit character encoding to evade endpoint restrictions. While the attack requires the authenticated user's cooperation through phishing, it poses a significant security risk due to the potential for unauthorized command execution.

Affected Version(s)

Splunk Cloud Platform 9.3.2411 < 9.3.2411.116

Splunk Cloud Platform 9.3.2408 < 9.3.2408.124

Splunk Cloud Platform 10.0.2503 < 10.0.2503.5

References

CVSS V3.1

Score:
3.5
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anton (therceman)
.
CVE-2025-20379 : Splunk Enterprise and Cloud Platform Vulnerability Affecting Low-Privileged Users