CVE-2025-20371: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.
AI Analysis
Technical Summary
CVE-2025-20371 is a server-side request forgery (SSRF) vulnerability found in Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, as well as in Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119, and 9.2.2406.122. The vulnerability arises because the Splunk web server accepts a URL or similar request from an upstream component and retrieves the contents of this URL without sufficiently validating that the request is directed to an expected or authorized destination. This insufficient validation allows an unauthenticated attacker to trigger a blind SSRF attack. Through this SSRF, the attacker can cause the Splunk server to perform REST API calls on behalf of an authenticated user with high privileges, effectively bypassing authentication and authorization controls. The vulnerability affects multiple major versions of Splunk Enterprise and Cloud Platform, indicating a broad attack surface. The CVSS 3.1 base score is 7.5, reflecting high severity due to the potential for full confidentiality, integrity, and availability compromise. Exploitation requires no privileges but does require the attacker to send a crafted request, which may involve some user interaction or network access. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated as a significant risk. The issue was reserved in October 2024 and published in October 2025, with no patch links provided in the source data, indicating organizations should monitor official Splunk advisories for updates. The vulnerability could be leveraged to pivot within networks, access sensitive data, or disrupt services.
Potential Impact
The impact of CVE-2025-20371 is substantial for organizations using affected versions of Splunk Enterprise and Splunk Cloud Platform. Successful exploitation allows an unauthenticated attacker to perform SSRF attacks that can lead to unauthorized REST API calls with high-privileged user rights. This can result in unauthorized access to sensitive data, manipulation or deletion of critical logs and configurations, and potential disruption of Splunk services. Given Splunk's role in security monitoring, log aggregation, and operational intelligence, compromise could undermine an organization's entire security posture, allowing attackers to cover tracks, disable alerts, or escalate attacks. The vulnerability affects confidentiality by exposing internal resources, integrity by allowing unauthorized API actions, and availability by potentially disrupting Splunk operations. The ease of exploitation (no authentication required) and the broad deployment of Splunk in enterprises worldwide amplify the risk. Organizations relying on Splunk for security monitoring and incident response are particularly vulnerable, as attackers could manipulate or disable these defenses. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
To mitigate CVE-2025-20371, organizations should immediately identify all instances of Splunk Enterprise and Splunk Cloud Platform in their environment and verify their versions against the affected list. The primary mitigation is to apply official patches or upgrade to versions 10.0.1, 9.4.4, 9.3.6, or 9.2.8 and above for Splunk Enterprise, and the corresponding patched versions for Splunk Cloud Platform once available. Until patches are applied, implement strict network segmentation and firewall rules to restrict outbound HTTP/HTTPS requests from Splunk servers to only trusted and necessary destinations, minimizing the SSRF attack surface. Additionally, monitor Splunk logs for unusual or unexpected REST API calls and anomalous network traffic patterns indicative of SSRF exploitation attempts. Employ web application firewalls (WAFs) with SSRF detection capabilities to block suspicious requests targeting Splunk web interfaces. Review and harden Splunk REST API access controls and audit logs frequently to detect unauthorized activities. Engage with Splunk support and subscribe to security advisories to receive timely updates. Finally, conduct internal penetration testing focused on SSRF vectors to validate the effectiveness of mitigations.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, Japan, France, Netherlands, India, South Korea, Singapore
CVE-2025-20371: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20371 is a server-side request forgery (SSRF) vulnerability found in Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, as well as in Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119, and 9.2.2406.122. The vulnerability arises because the Splunk web server accepts a URL or similar request from an upstream component and retrieves the contents of this URL without sufficiently validating that the request is directed to an expected or authorized destination. This insufficient validation allows an unauthenticated attacker to trigger a blind SSRF attack. Through this SSRF, the attacker can cause the Splunk server to perform REST API calls on behalf of an authenticated user with high privileges, effectively bypassing authentication and authorization controls. The vulnerability affects multiple major versions of Splunk Enterprise and Cloud Platform, indicating a broad attack surface. The CVSS 3.1 base score is 7.5, reflecting high severity due to the potential for full confidentiality, integrity, and availability compromise. Exploitation requires no privileges but does require the attacker to send a crafted request, which may involve some user interaction or network access. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated as a significant risk. The issue was reserved in October 2024 and published in October 2025, with no patch links provided in the source data, indicating organizations should monitor official Splunk advisories for updates. The vulnerability could be leveraged to pivot within networks, access sensitive data, or disrupt services.
Potential Impact
The impact of CVE-2025-20371 is substantial for organizations using affected versions of Splunk Enterprise and Splunk Cloud Platform. Successful exploitation allows an unauthenticated attacker to perform SSRF attacks that can lead to unauthorized REST API calls with high-privileged user rights. This can result in unauthorized access to sensitive data, manipulation or deletion of critical logs and configurations, and potential disruption of Splunk services. Given Splunk's role in security monitoring, log aggregation, and operational intelligence, compromise could undermine an organization's entire security posture, allowing attackers to cover tracks, disable alerts, or escalate attacks. The vulnerability affects confidentiality by exposing internal resources, integrity by allowing unauthorized API actions, and availability by potentially disrupting Splunk operations. The ease of exploitation (no authentication required) and the broad deployment of Splunk in enterprises worldwide amplify the risk. Organizations relying on Splunk for security monitoring and incident response are particularly vulnerable, as attackers could manipulate or disable these defenses. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
To mitigate CVE-2025-20371, organizations should immediately identify all instances of Splunk Enterprise and Splunk Cloud Platform in their environment and verify their versions against the affected list. The primary mitigation is to apply official patches or upgrade to versions 10.0.1, 9.4.4, 9.3.6, or 9.2.8 and above for Splunk Enterprise, and the corresponding patched versions for Splunk Cloud Platform once available. Until patches are applied, implement strict network segmentation and firewall rules to restrict outbound HTTP/HTTPS requests from Splunk servers to only trusted and necessary destinations, minimizing the SSRF attack surface. Additionally, monitor Splunk logs for unusual or unexpected REST API calls and anomalous network traffic patterns indicative of SSRF exploitation attempts. Employ web application firewalls (WAFs) with SSRF detection capabilities to block suspicious requests targeting Splunk web interfaces. Review and harden Splunk REST API access controls and audit logs frequently to detect unauthorized activities. Engage with Splunk support and subscribe to security advisories to receive timely updates. Finally, conduct internal penetration testing focused on SSRF vectors to validate the effectiveness of mitigations.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.262Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dd5401795552734e391067
Added to database: 10/1/2025, 4:17:05 PM
Last enriched: 2/27/2026, 12:26:31 AM
Last updated: 3/26/2026, 11:14:26 AM
Views: 303
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.