Input Validation Issue in Splunk Enterprise and Cloud Platform by Splunk
CVE-2026-20202

6.6MEDIUM

Key Information:

Vendor

Splunk

Vendor
CVE Published:
15 April 2026

What is CVE-2026-20202?

In certain versions of Splunk Enterprise and Splunk Cloud Platform, a vulnerability exists that allows a user with high-privilege capabilities to create a username that improperly handles null byte characters or non-UTF-8 percent-encoded bytes. This flaw arises from inadequate input validation, leading to potential issues in username storage and user account management, such as preventing affected users from being edited or deleted effectively. Organizations using these affected versions should take immediate steps to mitigate this risk by applying the necessary updates and monitoring their systems for unusual account activities.

Affected Version(s)

Splunk Cloud Platform 10.4.2603

Splunk Cloud Platform 10.3.2512 < 10.3.2512.6

Splunk Cloud Platform 10.2.2510 < 10.2.2510.10

References

CVSS V3.1

Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ryan Luke<br><br>Mahfujur Rahman (mahfujwhh)
.