Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46214: The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system. in Splunk Splunk Enterprise

0
High
VulnerabilityCVE-2023-46214cvecve-2023-46214
Published: Thu Nov 16 2023 (11/16/2023, 20:15:25 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

CVE-2023-46214 is a high-severity vulnerability in Splunk Enterprise versions prior to 9. 0. 7 and 9. 1. 2, where improper sanitization of user-supplied XSLT allows attackers to execute remote code. The flaw arises from the software's failure to neutralize special XML elements, enabling malicious modification of XML syntax or commands. Exploitation requires low privileges and user interaction, with a high attack complexity. Successful attacks can compromise confidentiality, integrity, and availability of the affected Splunk instance. No known exploits are currently reported in the wild. European organizations using vulnerable Splunk versions, especially in critical infrastructure and large enterprises, face significant risk.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:32:47 UTC

Technical Analysis

CVE-2023-46214 is a vulnerability affecting Splunk Enterprise versions below 9.0.7 and 9.1.2, caused by improper sanitization of extensible stylesheet language transformations (XSLT) supplied by users. Splunk Enterprise processes XML data and supports XSLT for transforming XML content. However, the software does not adequately neutralize special XML elements within user-supplied XSLT, allowing attackers to manipulate XML syntax, content, or commands before processing. This flaw enables an attacker with low privileges to upload malicious XSLT files that can trigger remote code execution (RCE) on the Splunk server. The vulnerability requires user interaction and has a high attack complexity, but the impact on confidentiality, integrity, and availability is severe, potentially allowing full system compromise. The CVSS v3.1 base score is 8.0, with vector AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating network attack vector, high complexity, low privileges, required user interaction, and scope change. No public exploits have been reported yet, but the vulnerability is critical due to Splunk's role in enterprise security monitoring and data analysis. The vulnerability was publicly disclosed on November 16, 2023, and fixed in versions 9.0.7 and 9.1.2.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Splunk Enterprise for security information and event management (SIEM) and operational intelligence. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized access, manipulate logs, exfiltrate sensitive data, or disrupt monitoring capabilities. This undermines incident detection and response, potentially enabling further lateral movement or persistence within networks. Critical sectors such as finance, energy, telecommunications, and government agencies are particularly vulnerable due to their reliance on Splunk for security operations. The compromise of Splunk instances could lead to data breaches, operational disruptions, and loss of trust. Given the network attack vector and the widespread use of Splunk in Europe, the threat could have broad implications if exploited at scale.

Mitigation Recommendations

1. Immediately upgrade all Splunk Enterprise instances to version 9.0.7, 9.1.2, or later where the vulnerability is patched. 2. Restrict permissions for uploading or modifying XSLT files to trusted administrators only, minimizing the attack surface. 3. Implement strict input validation and monitoring for unusual XSLT upload activities or XML processing anomalies. 4. Employ network segmentation to isolate Splunk servers from less trusted network zones. 5. Monitor Splunk logs and system behavior for signs of exploitation attempts or unexpected code execution. 6. Use application whitelisting and endpoint protection on Splunk servers to detect and block unauthorized processes. 7. Conduct regular security audits and penetration testing focused on XML and XSLT handling within Splunk environments. 8. Educate administrators about the risks of uploading untrusted XSLT content and enforce policies accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Splunk
Date Reserved
2023-10-18T17:02:51.236Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f571b0bd07c3938a607

Added to database: 6/10/2025, 6:54:15 PM

Last enriched: 12/23/2025, 6:32:47 PM

Last updated: 1/19/2026, 9:54:48 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats