Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20366: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. in Splunk Splunk Enterprise

0
Medium
VulnerabilityCVE-2025-20366cvecve-2025-20366
Published: Wed Oct 01 2025 (10/01/2025, 16:07:56 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.

AI-Powered Analysis

AILast updated: 10/08/2025, 16:57:52 UTC

Technical Analysis

CVE-2025-20366 is a vulnerability affecting Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, as well as corresponding versions of Splunk Cloud Platform. The issue arises because Splunk does not adequately restrict access to search job results when those jobs are run with administrative privileges in the background. Specifically, a low-privileged user who does not have admin or power roles can access sensitive search results if they correctly guess the unique Search ID (SID) associated with an administrative search job. The SID acts as a key to retrieve the job’s results, and if exposed, it can leak sensitive data contained in those search results. This vulnerability is exploitable remotely without user interaction, requiring only low privileges and knowledge or guessing of the SID. The CVSS v3.1 score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The vulnerability is rooted in improper access control mechanisms around job management and search result retrieval in Splunk’s architecture. No public exploits have been reported yet, but the potential for sensitive data exposure is significant, especially in environments where Splunk is used to analyze security logs, network traffic, or other confidential information. The vulnerability affects multiple recent versions of Splunk Enterprise and Cloud Platform, necessitating prompt patching or mitigation by affected organizations.

Potential Impact

For European organizations, the primary impact of CVE-2025-20366 is the unauthorized disclosure of sensitive information contained in Splunk search results. Since Splunk is widely used for security monitoring, log analysis, and operational intelligence, exposure of these results could reveal confidential operational data, security alerts, or personally identifiable information (PII). This could lead to compliance violations under GDPR and other data protection regulations, reputational damage, and increased risk of targeted attacks if threat intelligence or internal security posture details are leaked. The vulnerability does not allow modification or disruption of services, so integrity and availability impacts are minimal. However, the confidentiality breach alone can have serious consequences in sectors such as finance, telecommunications, government, and critical infrastructure, where Splunk is heavily deployed. The ease of exploitation (low privilege and no user interaction) increases the risk profile, especially in multi-tenant or shared environments where low-privileged users exist. Organizations that have not upgraded to patched versions remain vulnerable to potential insider threats or attackers who gain low-level access.

Mitigation Recommendations

To mitigate CVE-2025-20366, European organizations should immediately upgrade affected Splunk Enterprise and Splunk Cloud Platform instances to versions 9.4.4, 9.3.6, 9.2.8 or later, as these contain the necessary access control fixes. Until upgrades can be applied, organizations should restrict access to the Splunk search job management interfaces and ensure that low-privileged users cannot enumerate or guess Search IDs (SIDs). Implement network segmentation and strict role-based access controls (RBAC) to limit which users can view or interact with search jobs. Monitoring and alerting on unusual access patterns to search job endpoints can help detect exploitation attempts. Additionally, review and audit Splunk user roles and permissions regularly to minimize the number of users with elevated privileges. If possible, disable or limit background administrative search jobs that produce sensitive results accessible via SIDs. Finally, educate administrators and security teams about this vulnerability and the importance of applying patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dd5401795552734e391058

Added to database: 10/1/2025, 4:17:05 PM

Last enriched: 10/8/2025, 4:57:52 PM

Last updated: 11/22/2025, 3:19:57 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats