Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20379: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise

0
Low
VulnerabilityCVE-2025-20379cvecve-2025-20379
Published: Wed Nov 12 2025 (11/12/2025, 17:23:00 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, and 9.2.9 and Splunk Cloud Platform versions below 9.3.2411.116, 9.3.2408.124, 10.0.2503.5 and 10.1.2507.1, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands. They could bypass these safeguards on the “/services/streams/search“ endpoint through its “q“ parameter by circumventing endpoint restrictions using character encoding in the REST path. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

AI-Powered Analysis

AILast updated: 11/19/2025, 19:04:34 UTC

Technical Analysis

CVE-2025-20379 affects Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, and 9.2.9, as well as Splunk Cloud Platform versions below 9.3.2411.116, 9.3.2408.124, 10.0.2503.5, and 10.1.2507.1. The vulnerability arises because a low-privileged user lacking 'admin' or 'power' roles can run a saved search containing risky commands with the permissions of a higher-privileged user. This is achieved by exploiting the /services/streams/search REST endpoint's 'q' parameter, where character encoding is used to bypass endpoint restrictions designed to prevent execution of risky commands. The vulnerability requires the attacker to phish an authenticated user, tricking them into initiating a crafted request within their browser, as the attacker cannot exploit it directly without user interaction. The impact is limited to unauthorized information disclosure, as the attacker gains access to sensitive data without the ability to alter or disrupt system integrity or availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N) reflects that the attack is network-based, requires low privileges, user interaction, and results in limited confidentiality impact without affecting integrity or availability. No known exploits have been observed in the wild, but the vulnerability poses a risk especially in environments where users have elevated privileges and phishing attacks are plausible. The vulnerability highlights the importance of strict role-based access controls and input validation on REST endpoints handling sensitive commands.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive information within Splunk environments, which may include logs, monitoring data, or other operational intelligence. This could lead to exposure of confidential business information, compliance violations (e.g., GDPR), and potential reputational damage. Since Splunk is widely used in sectors such as finance, telecommunications, and critical infrastructure monitoring across Europe, unauthorized access to sensitive data could aid attackers in reconnaissance or lateral movement. The requirement for phishing and user interaction reduces the likelihood of widespread automated exploitation but increases risk in organizations with less mature security awareness or phishing defenses. The vulnerability does not allow data modification or service disruption, limiting direct operational impact but still posing a significant confidentiality risk. Organizations handling regulated or sensitive data must consider this vulnerability a threat to data privacy and compliance obligations.

Mitigation Recommendations

European organizations should immediately upgrade affected Splunk Enterprise and Cloud Platform instances to the patched versions specified by Splunk (10.0.1, 9.4.5, 9.3.7, 9.2.9 for Enterprise and corresponding Cloud versions). In the interim, restrict access to the /services/streams/search endpoint to only trusted users and roles, and implement strict role-based access controls to ensure low-privileged users cannot execute saved searches with risky commands. Enhance phishing defenses through user training, email filtering, and multi-factor authentication to reduce the risk of attackers tricking users into initiating malicious requests. Monitor Splunk logs for unusual activity related to saved searches and REST API calls, especially those involving the 'q' parameter. Consider implementing web application firewalls or API gateways that can detect and block suspicious character encoding or anomalous REST requests. Regularly audit Splunk roles and permissions to minimize privilege creep and ensure that only necessary users have elevated roles. Finally, maintain an incident response plan that includes detection and containment strategies for potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914cdd8e9dc40953be87359

Added to database: 11/12/2025, 6:11:36 PM

Last enriched: 11/19/2025, 7:04:34 PM

Last updated: 12/27/2025, 11:19:46 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats