Remote Code Execution Vulnerability in Splunk Enterprise and Cloud Platforms
CVE-2026-20204

7.1HIGH

Key Information:

Vendor

Splunk

Vendor
CVE Published:
15 April 2026

What is CVE-2026-20204?

In affected versions of Splunk Enterprise and Splunk Cloud Platform, a low-privileged user without admin or power roles may exploit improper handling of temporary files in the 'apptemp' directory. By uploading a malicious file, the user could execute arbitrary code on the server, potentially compromising the integrity and confidentiality of the system. Users are advised to upgrade to the latest versions to mitigate this risk.

Affected Version(s)

Splunk Cloud Platform 10.4.2603

Splunk Cloud Platform 10.3.2512 < 10.3.2512.5

Splunk Cloud Platform 10.2.2510 < 10.2.2510.9

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gabriel Nitu, Splunk
.