CVE-2025-20366: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.
AI Analysis
Technical Summary
CVE-2025-20366 is a vulnerability affecting Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, as well as corresponding versions of Splunk Cloud Platform. The issue arises because Splunk does not adequately restrict access to search job results when those jobs are run with administrative privileges in the background. Specifically, a low-privileged user who does not have admin or power roles can access sensitive search results if they correctly guess the unique Search ID (SID) associated with an administrative search job. The SID acts as a key to retrieve the job’s results, and if exposed, it can leak sensitive data contained in those search results. This vulnerability is exploitable remotely without user interaction, requiring only low privileges and knowledge or guessing of the SID. The CVSS v3.1 score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The vulnerability is rooted in improper access control mechanisms around job management and search result retrieval in Splunk’s architecture. No public exploits have been reported yet, but the potential for sensitive data exposure is significant, especially in environments where Splunk is used to analyze security logs, network traffic, or other confidential information. The vulnerability affects multiple recent versions of Splunk Enterprise and Cloud Platform, necessitating prompt patching or mitigation by affected organizations.
Potential Impact
For European organizations, the primary impact of CVE-2025-20366 is the unauthorized disclosure of sensitive information contained in Splunk search results. Since Splunk is widely used for security monitoring, log analysis, and operational intelligence, exposure of these results could reveal confidential operational data, security alerts, or personally identifiable information (PII). This could lead to compliance violations under GDPR and other data protection regulations, reputational damage, and increased risk of targeted attacks if threat intelligence or internal security posture details are leaked. The vulnerability does not allow modification or disruption of services, so integrity and availability impacts are minimal. However, the confidentiality breach alone can have serious consequences in sectors such as finance, telecommunications, government, and critical infrastructure, where Splunk is heavily deployed. The ease of exploitation (low privilege and no user interaction) increases the risk profile, especially in multi-tenant or shared environments where low-privileged users exist. Organizations that have not upgraded to patched versions remain vulnerable to potential insider threats or attackers who gain low-level access.
Mitigation Recommendations
To mitigate CVE-2025-20366, European organizations should immediately upgrade affected Splunk Enterprise and Splunk Cloud Platform instances to versions 9.4.4, 9.3.6, 9.2.8 or later, as these contain the necessary access control fixes. Until upgrades can be applied, organizations should restrict access to the Splunk search job management interfaces and ensure that low-privileged users cannot enumerate or guess Search IDs (SIDs). Implement network segmentation and strict role-based access controls (RBAC) to limit which users can view or interact with search jobs. Monitoring and alerting on unusual access patterns to search job endpoints can help detect exploitation attempts. Additionally, review and audit Splunk user roles and permissions regularly to minimize the number of users with elevated privileges. If possible, disable or limit background administrative search jobs that produce sensitive results accessible via SIDs. Finally, educate administrators and security teams about this vulnerability and the importance of applying patches promptly.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-20366: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.
AI-Powered Analysis
Technical Analysis
CVE-2025-20366 is a vulnerability affecting Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, as well as corresponding versions of Splunk Cloud Platform. The issue arises because Splunk does not adequately restrict access to search job results when those jobs are run with administrative privileges in the background. Specifically, a low-privileged user who does not have admin or power roles can access sensitive search results if they correctly guess the unique Search ID (SID) associated with an administrative search job. The SID acts as a key to retrieve the job’s results, and if exposed, it can leak sensitive data contained in those search results. This vulnerability is exploitable remotely without user interaction, requiring only low privileges and knowledge or guessing of the SID. The CVSS v3.1 score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The vulnerability is rooted in improper access control mechanisms around job management and search result retrieval in Splunk’s architecture. No public exploits have been reported yet, but the potential for sensitive data exposure is significant, especially in environments where Splunk is used to analyze security logs, network traffic, or other confidential information. The vulnerability affects multiple recent versions of Splunk Enterprise and Cloud Platform, necessitating prompt patching or mitigation by affected organizations.
Potential Impact
For European organizations, the primary impact of CVE-2025-20366 is the unauthorized disclosure of sensitive information contained in Splunk search results. Since Splunk is widely used for security monitoring, log analysis, and operational intelligence, exposure of these results could reveal confidential operational data, security alerts, or personally identifiable information (PII). This could lead to compliance violations under GDPR and other data protection regulations, reputational damage, and increased risk of targeted attacks if threat intelligence or internal security posture details are leaked. The vulnerability does not allow modification or disruption of services, so integrity and availability impacts are minimal. However, the confidentiality breach alone can have serious consequences in sectors such as finance, telecommunications, government, and critical infrastructure, where Splunk is heavily deployed. The ease of exploitation (low privilege and no user interaction) increases the risk profile, especially in multi-tenant or shared environments where low-privileged users exist. Organizations that have not upgraded to patched versions remain vulnerable to potential insider threats or attackers who gain low-level access.
Mitigation Recommendations
To mitigate CVE-2025-20366, European organizations should immediately upgrade affected Splunk Enterprise and Splunk Cloud Platform instances to versions 9.4.4, 9.3.6, 9.2.8 or later, as these contain the necessary access control fixes. Until upgrades can be applied, organizations should restrict access to the Splunk search job management interfaces and ensure that low-privileged users cannot enumerate or guess Search IDs (SIDs). Implement network segmentation and strict role-based access controls (RBAC) to limit which users can view or interact with search jobs. Monitoring and alerting on unusual access patterns to search job endpoints can help detect exploitation attempts. Additionally, review and audit Splunk user roles and permissions regularly to minimize the number of users with elevated privileges. If possible, disable or limit background administrative search jobs that produce sensitive results accessible via SIDs. Finally, educate administrators and security teams about this vulnerability and the importance of applying patches promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.261Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dd5401795552734e391058
Added to database: 10/1/2025, 4:17:05 PM
Last enriched: 10/8/2025, 4:57:52 PM
Last updated: 11/22/2025, 3:19:57 PM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.